Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-031-29927-8_24guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Hardware Trojan Exploiting Coherence Protocol on NoCs

Published: 08 April 2023 Publication History
  • Get Citation Alerts
  • Abstract

    Intellectual property (IP) has been used in Network on chips (NoCs) for reducing costs and shortening the time to market. However, there is a probability that a third-party vendor injects hardware that behaves maliciously. This study firstly illustrates the security risk of a hardware Trojan for eavesdropping and reducing the system performance by malicious coherent messages. It only increases the amounts of communications and calculations obeying a coherence protocol, allowing applications to perform correctly. This study secondly presents its countermeasure at network interfaces. It compares the number of output messages to input messages at network interfaces to detect malicious coherent messages. This risk causes, on a chip-multiprocessor, execution time to increase by up to 24%, the amount of traffic to increase by up to 18%, and the energy consumption to increase by up to 8.9%. Since the benchmarks in the evaluation are small, we expect that real-life applications would be highly affected by the hardware Trojan. Our countermeasure avoids these performance degradation, and it can be implemented with a significantly low overhead of only 1.3% in a network interface on a chip.

    References

    [1]
    Ancajas, D.M., Chakraborty, K., Roy, S.: Fort-NoCs: mitigating the threat of a compromised NoC. In: Design Automation Conference (DAC), pp. 1–6 (2014)
    [2]
    Charles, S., Mishra, P.: Securing network-on-chip using incremental cryptography. In: Symposium on VLSI (ISVLSI), pp. 168–175 (2020)
    [3]
    Charles S and Mishra P A survey of network-on-chip security attacks and countermeasures ACM Comput. Surv. (CSUR) 2021 54 5 1-36
    [4]
    Hussain, M., Malekpour, A., Guo, H., Parameswaran, S.: EETD: an energy efficient design for runtime hardware trojan detection in untrusted network-on-chip. In: Symposium on VLSI (ISVLSI), pp. 345–350 (2018)
    [5]
    Kim, M., Kong, S., Hong, B., Xu, L., Shi, W., Suh, T.: Evaluating coherence-exploiting hardware trojan. In: Design, Automation Test in Europe Conference Exhibition (DATE), pp. 157–162 (2017)
    [6]
    Binkert N et al. The gem5 Simulator ACM SIGARCH Comput. Archit. News 2011 39 2 1-7
    [7]
    Rajesh, J., Ancajas, D.M., Chakraborty, K., Roy, S.: Runtime detection of a bandwidth denial attack from a rogue network-on-chip. In: International Symposium on Networks-on-Chip, pp. 1–8 (2015)
    [8]
    Raparti, V.Y., Pasricha, S.: Lightweight mitigation of hardware trojan attacks in NoC-based manycore computing. In: Design Automation Conference (DAC), pp. 1–6 (2019)
    [9]
    Ro, Y., Jin, S., Huh, J., Kim, J.: Ghost routing to enable oblivious computation on memory-centric networks. In: International Symposium on Computer Architecture (ISCA), pp. 930–943 (2021)
    [10]
    Tehranipoor M and Koushanfar F A survey of hardware trojan taxonomy and detection IEEE Des. Test Comput. 2010 27 1 10-25
    [11]
    Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards trojan-free trusted ICs: problem analysis and detection scheme. In: Design, Automation and Test in Europe (DATE), pp. 1362–1365 (2008)

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    Parallel and Distributed Computing, Applications and Technologies: 23rd International Conference, PDCAT 2022, Sendai, Japan, December 7–9, 2022, Proceedings
    Dec 2022
    525 pages
    ISBN:978-3-031-29926-1
    DOI:10.1007/978-3-031-29927-8

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 08 April 2023

    Author Tags

    1. Interconnection networks
    2. Hardware Trojan
    3. Network interface
    4. Network on chip (NoC)

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media