ABSTRACT
The advent of hardware Trojans is posing an increasing threat on complex integrated circuits. Network-on-Chip, the established communication infrastructure for many core systems-on-chip, are growing in complexity. Integration of third-party components, which are increasingly becoming valuable targets, exposes the surface for attacks through the injection of hardware Trojans. In this paper, we address active attacks on NoCs, and focus on the integrity of transmitted data. Basically, we use network coding for the transmission of data in order to increase efficiency and robustness.
We introduce solutions that allow detection of active attacks under the consideration of the constraints in NoCs. The efficiency of these solutions is investigated by means of cycle-accurate simulations. Further, we develop an analytic approach for faster and more flexible but accurate evaluation. We finally analyze the area overhead using a state-of-the-art MPSoC and demonstrate that we can protect the integrity of data with reasonable effort.
- R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. 2000. Network information flow. IEEE Trans. on Inf. Theory 46, 4 (July 2000), 1204--1216. Google ScholarDigital Library
- Y. Alkabani and F. Koushanfar. 2008. Extended abstract: Designer #x2019;s hardware Trojan horse. In IEEE HOST. 82--83. Google ScholarDigital Library
- Dean Michael Ancajas, Koushik Chakraborty, and Sanghamitra Roy. 2014. Fort-NoCs: Mitigating the Threat of a Compromised NoC. In Proc. of DAC. 158:1--158:6. Google ScholarDigital Library
- L Benini and G De Micheli. 2002. Networks on chips: a new SoC paradigm. Computer 35, 1 (Jan. 2002), 70--78. Google ScholarDigital Library
- Travis Boraten and Avinash Karanth Kodi. 2016. Packet Security with Path Sensitization for NoCs. In Proc. of DATE. 1136--1139. Google ScholarDigital Library
- Julia Borghoff et al. 2012. PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications. Technical Report. 208--225 pages.Google Scholar
- Shekhar Borkar. 2007. Thousand Core Chips: A Technology Perspective. In Proc. of DAC. 746--749. Google ScholarDigital Library
- Philip A. Chou, Yunnan Wu, and Kamal Jain. 2003. Practical Network Coding. In Proc. Annual Allerton Conf. on Comm., Control, and Computing.Google Scholar
- W.J. Dally and B. Towles. 2001. Route packets, not wires: on-chip interconnection networks. In Proc. of DAC. 684--689. Google ScholarDigital Library
- Samuel Evain and Jean-Philippe Diguet. 2005. From NoC Security Analysis to Design Solutions. In Proc. of IEEE SiPS.Google ScholarCross Ref
- Samuel Evain and Jean-Philippe Diguet. 2005. From NoC Security Analysis to Design Solutions. Proc. of IEEE SiPS 1 (2005).Google ScholarCross Ref
- J. Frey and Qiaoyan Yu. 2015. Exploiting State Obfuscation to Detect Hardware Trojans in NoC Network Interfaces. In Proc. of IEEE MWSCAS. 1--4.Google ScholarCross Ref
- Jonathan Frey and Qiaoyan Yu. 2016. A hardened network-on-chip design using runtime hardware Trojan mitigation methods. Integration, the VLSI journal 56 (2016), 15--31. Google ScholarDigital Library
- S. Haas et al. 2017. A heterogeneous SDR MPSoC in 28nmCMOS for low-latency wireless applications. In Proc. of DAC. Google ScholarDigital Library
- Axel Jantsch and Hannu Tenhunen. 2004. Will Networks on Chip Close the Productivity Gap? In Networks on Chip, Axel Jantsch and Hannu Tenhunen (Eds.). Springer US, 3--18. Google ScholarDigital Library
- Y. Jin, N. Kupp, and Y. Makris. 2009. Experiences in Hardware Trojan design and implementation. In IEEE HOST. 50--57. Google ScholarDigital Library
- Hemangee K. Kapoor et al. 2013. A Security Framework for NoC Using Authen- ticated Encryption and Session Keys. Circuits, Systems, and Signal Processing 32, 6 (2013), 2605--2622.Google ScholarDigital Library
- Leonard Kleinrock. 1975. Queueing systems - 1: Theory. Wiley, New York.Google Scholar
- Paul Kocher et al. 2004. Security as a New Dimension in Embedded System Design. In Proc. of DAC. 753--760. Google ScholarDigital Library
- Chae Hoon Lim and Tymur Korishko. 2006. mCrypton -- A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors. In WISA 2005.Google ScholarDigital Library
- Sadia Moriam et al. 2015. Resilient and Efficient Communication in Many-Core Systems using Network Coding. In Proc. of IEEE IPCCC. Google ScholarDigital Library
- NIST Special Publication 800--38A. 2001. Recommendation for Block Cipher Modes of Operation -- Methods and Techniques. U.S. DoC/NIST. (December 2001).Google Scholar
- Stefan Pfennig and Elke Franz. 2017. Security Aspects of Confidential Network Coding. In Proc. of IEEE ICC CISS.Google ScholarCross Ref
- M. Radetzki et al. 2013. Methods of Fault Tolerance in Networks-on-Chip. Comput. Surveys 46, 1 (Oct 2013). Google ScholarDigital Library
- Simha Sethumadhavan et al . 2015. Trustworthy Hardware from Untrusted Components. Comm. of the ACM 58, 9 (Aug. 2015), 60--71. Google ScholarDigital Library
- Gustavus J. Simmons (Ed.). 1991. Contemporary Cryptography -- The Science of Information Integrity. IEEE Press Google ScholarDigital Library
Index Terms
- Protecting Communication in Many-Core Systems against Active Attackers
Recommendations
Lightweight Authenticated Encryption for Network-on-Chip Communications
GLSVLSI '19: Proceedings of the 2019 on Great Lakes Symposium on VLSIIn recent years, Network-on-Chip (NoC) has gained increasing popularity as a promising solution for the challenging interconnection problem in multi-processor systems-on-chip (MPSoCs). However, the interest of adversaries to compromise such systems grew ...
Towards NoC Protection of HT-Greyhole Attack
Algorithms and Architectures for Parallel ProcessingAbstractAs the number of processing cores is increasing dramatically, the communication among them is of high importance. Network-on-Chip (NoC) has direct access to all resources and information within a System-on-Chip (SoC) by rendering it appealing to ...
Hacking and protecting IC hardware
DATE '14: Proceedings of the conference on Design, Automation & Test in EuropeTraditionally most of people treat a hardware solution as an inherently trusted box. "it is hardware not software; so it is secure and trustworthy", they say. Recent research shows the need to re-asses this trust in hardware and even in its supply ...
Comments