Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2659651.2659719acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

An ID and Address Protection Unit for NoC based Communication Architectures

Published: 09 September 2014 Publication History

Abstract

Security is becoming the primary concern in today's embedded systems. Network-on-Chip (NoC) based communication architectures have emerged as an alternative to shared bus mechanism in Multiprocessor System-on-Chip (MPSoC) devices, and the increasing number and functionality of processing cores has made such systems vulnerable to security attacks. In this paper an id and address verification (IAV) security module is presented, which is embedded in each router at the communication level. IAV verifies the identity and address range to be accessed by incoming and outgoing data packets in a NoC-based many-core shared memory architecture. Our IAV architecture is implemented on a FPGA device for functional verification and evaluated in terms of its area and power consumption overhead. For FPGA-based systems, the IAV module can be reconfigured at run-time through partial reconfiguration. In addition, a cycle-accurate simulation is carried out to analyse the performance overhead for different network configurations. The proposed IAV module has reduced area and power consumption overhead when compared with similar existing solutions.

References

[1]
P. Abad, P. Prieto, L. Menezo, A. Colaso, V. Puente, and J.-A. Gregorio. Topaz: An open-source interconnection network simulator for chip multiprocessors and supercomputers. In Networks on Chip (NoCS), 2012 Sixth IEEE/ACM International Symposium on, pages 99--106, 2012.
[2]
D. Arora, S. Ravi, A. Raghunathan, and N. Jha. Secure embedded processing through hardware-assisted run-time monitoring. In Design, Automation and Test in Europe, 2005. Proceedings, pages 178--183 Vol. 1, 2005.
[3]
C. Bienia, S. Kumar, J. P. Singh, and K. Li. The PARSEC benchmark suite: characterization and architectural implications. In Proceedings of the 17th international conference on Parallel architectures and compilation techniques, pages 72--81. ACM, 2008.
[4]
E. Chien and P. Ször. Blended attacks exploits, vulnerabilities and buffer-overflow techniques in computer viruses. Virus, 1, 2002.
[5]
J.-P. Diguet, S. Evain, R. Vaslin, G. Gogniat, and E. Juin. Noc-centric security of reconfigurable soc. In Networks-on-Chip, 2007. NOCS 2007. First International Symposium on, pages 223--232, 2007.
[6]
L. Fiorin, G. Palermo, S. Lukovic, V. Catalano, and C. Silvano. Secure memory accesses on networks-on-chip. Computers, IEEE Transactions on, 57(9):1216--1229, 2008.
[7]
L. Fiorin, G. Palermo, S. Lukovic, and C. Silvano. A data protection unit for noc-based architectures. In Proceedings of the 5th IEEE/ACM international conference on Hardware/software codesign and system synthesis, pages 167--172. ACM, 2007.
[8]
L. Fiorin, G. Palermo, and C. Silvano. A security monitoring service for nocs. In Proceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis, CODES+ISSS '08, pages 197--202, 2008.
[9]
J. Hestness, B. Grot, and S. W. Keckler. Netrace: dependency-driven trace-based network-on-chip simulation. In Proceedings of the Third International Workshop on Network on Chip Architectures, pages 31--36. ACM, 2010.
[10]
J. Hestness and S. W. Keckler. Netrace: Dependency-Tracking Traces for Efficient Network-on-Chip Experimentation. Technical Report TR-10-11, The University of Texas at Austin, Department of Computer Scienc, May 2011.
[11]
G. Kornaros and D. Pnevmatikatos. A survey and taxonomy of on-chip monitoring of multicore systems-on-chip. ACM Trans. Des. Autom. Electron. Syst., 18(2):17:1--17:38, Apr. 2013.
[12]
S. Lukovic and N. Christianos. Enhancing network-on-chip components to support security of processing elements. In Proceedings of the 5th Workshop on Embedded Systems Security, WESS '10, pages 12:1--12:9, 2010.
[13]
S. Mao and T. Wolf. Hardware support for secure processing in embedded systems. Computers, IEEE Transactions on, 59(6):847--854, 2010.
[14]
M. Rahmatian, H. Kooti, I. Harris, and E. Bozorgzadeh. Hardware-assisted detection of malicious software in embedded systems. Embedded Systems Letters, IEEE, 4(4):94--97, 2012.
[15]
P. Schaumont and A. Raghunathan. Guest Editors' Introduction: Security and Trust in Embedded-Systems Design. Design Test of Computers, IEEE, 24(6):518--520, 2007.
[16]
Xilinx: ISE Design Suit, 2013.
[17]
Xilinx: Power Efficiency, 2013.

Cited By

View all
  • (2023)Coherence Attacks and Countermeasures in Interposer-based Chiplet SystemsACM Transactions on Architecture and Code Optimization10.1145/363346121:2(1-25)Online publication date: 20-Nov-2023
  • (2023)Domain Isolation and Access Control in Multi-tenant Cloud FPGAsSecurity of FPGA-Accelerated Cloud Computing Environments10.1007/978-3-031-45395-3_2(29-55)Online publication date: 18-Sep-2023
  • (2022)Digital Watermarking for Detecting Malicious Intellectual Property Cores in NoC ArchitecturesIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2022.316760630:7(952-965)Online publication date: Jul-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks
September 2014
518 pages
ISBN:9781450330336
DOI:10.1145/2659651
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 September 2014

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

SIN '14

Acceptance Rates

SIN '14 Paper Acceptance Rate 32 of 109 submissions, 29%;
Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Coherence Attacks and Countermeasures in Interposer-based Chiplet SystemsACM Transactions on Architecture and Code Optimization10.1145/363346121:2(1-25)Online publication date: 20-Nov-2023
  • (2023)Domain Isolation and Access Control in Multi-tenant Cloud FPGAsSecurity of FPGA-Accelerated Cloud Computing Environments10.1007/978-3-031-45395-3_2(29-55)Online publication date: 18-Sep-2023
  • (2022)Digital Watermarking for Detecting Malicious Intellectual Property Cores in NoC ArchitecturesIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2022.316760630:7(952-965)Online publication date: Jul-2022
  • (2021)Survey on Blockchain NetworkingACM Computing Surveys10.1145/345316154:5(1-34)Online publication date: 25-May-2021
  • (2021)Hierarchical Reinforcement LearningACM Computing Surveys10.1145/345316054:5(1-35)Online publication date: 5-Jun-2021
  • (2021)A Survey of Network-on-Chip Security Attacks and CountermeasuresACM Computing Surveys10.1145/345096454:5(1-36)Online publication date: 25-May-2021
  • (2021)A Survey of Unsupervised Generative Models for Exploratory Data Analysis and Representation LearningACM Computing Surveys10.1145/345096354:5(1-40)Online publication date: 9-Jul-2021
  • (2021)Bidirectional TypingACM Computing Surveys10.1145/345095254:5(1-38)Online publication date: 25-May-2021
  • (2021)A Systematic Literature Review on Federated Machine LearningACM Computing Surveys10.1145/345028854:5(1-39)Online publication date: 25-May-2021
  • (2021)Event Prediction in the Big Data EraACM Computing Surveys10.1145/345028754:5(1-37)Online publication date: 25-May-2021
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media