Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3194554.3194582acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article

Protecting Communication in Many-Core Systems against Active Attackers

Published: 30 May 2018 Publication History

Abstract

The advent of hardware Trojans is posing an increasing threat on complex integrated circuits. Network-on-Chip, the established communication infrastructure for many core systems-on-chip, are growing in complexity. Integration of third-party components, which are increasingly becoming valuable targets, exposes the surface for attacks through the injection of hardware Trojans. In this paper, we address active attacks on NoCs, and focus on the integrity of transmitted data. Basically, we use network coding for the transmission of data in order to increase efficiency and robustness.
We introduce solutions that allow detection of active attacks under the consideration of the constraints in NoCs. The efficiency of these solutions is investigated by means of cycle-accurate simulations. Further, we develop an analytic approach for faster and more flexible but accurate evaluation. We finally analyze the area overhead using a state-of-the-art MPSoC and demonstrate that we can protect the integrity of data with reasonable effort.

References

[1]
R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. 2000. Network information flow. IEEE Trans. on Inf. Theory 46, 4 (July 2000), 1204--1216.
[2]
Y. Alkabani and F. Koushanfar. 2008. Extended abstract: Designer #x2019;s hardware Trojan horse. In IEEE HOST. 82--83.
[3]
Dean Michael Ancajas, Koushik Chakraborty, and Sanghamitra Roy. 2014. Fort-NoCs: Mitigating the Threat of a Compromised NoC. In Proc. of DAC. 158:1--158:6.
[4]
L Benini and G De Micheli. 2002. Networks on chips: a new SoC paradigm. Computer 35, 1 (Jan. 2002), 70--78.
[5]
Travis Boraten and Avinash Karanth Kodi. 2016. Packet Security with Path Sensitization for NoCs. In Proc. of DATE. 1136--1139.
[6]
Julia Borghoff et al. 2012. PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications. Technical Report. 208--225 pages.
[7]
Shekhar Borkar. 2007. Thousand Core Chips: A Technology Perspective. In Proc. of DAC. 746--749.
[8]
Philip A. Chou, Yunnan Wu, and Kamal Jain. 2003. Practical Network Coding. In Proc. Annual Allerton Conf. on Comm., Control, and Computing.
[9]
W.J. Dally and B. Towles. 2001. Route packets, not wires: on-chip interconnection networks. In Proc. of DAC. 684--689.
[10]
Samuel Evain and Jean-Philippe Diguet. 2005. From NoC Security Analysis to Design Solutions. In Proc. of IEEE SiPS.
[11]
Samuel Evain and Jean-Philippe Diguet. 2005. From NoC Security Analysis to Design Solutions. Proc. of IEEE SiPS 1 (2005).
[12]
J. Frey and Qiaoyan Yu. 2015. Exploiting State Obfuscation to Detect Hardware Trojans in NoC Network Interfaces. In Proc. of IEEE MWSCAS. 1--4.
[13]
Jonathan Frey and Qiaoyan Yu. 2016. A hardened network-on-chip design using runtime hardware Trojan mitigation methods. Integration, the VLSI journal 56 (2016), 15--31.
[14]
S. Haas et al. 2017. A heterogeneous SDR MPSoC in 28nmCMOS for low-latency wireless applications. In Proc. of DAC.
[15]
Axel Jantsch and Hannu Tenhunen. 2004. Will Networks on Chip Close the Productivity Gap? In Networks on Chip, Axel Jantsch and Hannu Tenhunen (Eds.). Springer US, 3--18.
[16]
Y. Jin, N. Kupp, and Y. Makris. 2009. Experiences in Hardware Trojan design and implementation. In IEEE HOST. 50--57.
[17]
Hemangee K. Kapoor et al. 2013. A Security Framework for NoC Using Authen- ticated Encryption and Session Keys. Circuits, Systems, and Signal Processing 32, 6 (2013), 2605--2622.
[18]
Leonard Kleinrock. 1975. Queueing systems - 1: Theory. Wiley, New York.
[19]
Paul Kocher et al. 2004. Security as a New Dimension in Embedded System Design. In Proc. of DAC. 753--760.
[20]
Chae Hoon Lim and Tymur Korishko. 2006. mCrypton -- A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors. In WISA 2005.
[21]
Sadia Moriam et al. 2015. Resilient and Efficient Communication in Many-Core Systems using Network Coding. In Proc. of IEEE IPCCC.
[22]
NIST Special Publication 800--38A. 2001. Recommendation for Block Cipher Modes of Operation -- Methods and Techniques. U.S. DoC/NIST. (December 2001).
[23]
Stefan Pfennig and Elke Franz. 2017. Security Aspects of Confidential Network Coding. In Proc. of IEEE ICC CISS.
[24]
M. Radetzki et al. 2013. Methods of Fault Tolerance in Networks-on-Chip. Comput. Surveys 46, 1 (Oct 2013).
[25]
Simha Sethumadhavan et al . 2015. Trustworthy Hardware from Untrusted Components. Comm. of the ACM 58, 9 (Aug. 2015), 60--71.
[26]
Gustavus J. Simmons (Ed.). 1991. Contemporary Cryptography -- The Science of Information Integrity. IEEE Press

Cited By

View all
  • (2024)Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling ConceptsIEEE Access10.1109/ACCESS.2024.348027512(155666-155695)Online publication date: 2024
  • (2023)Enhancing Robustness and Reliability of Networks-on-Chip with Network Coding2023 IEEE Nordic Circuits and Systems Conference (NorCAS)10.1109/NorCAS58970.2023.10305485(1-7)Online publication date: 31-Oct-2023
  • (2022)Take a Bite of the Reality SandwichProceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3507657.3528539(207-221)Online publication date: 16-May-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
GLSVLSI '18: Proceedings of the 2018 Great Lakes Symposium on VLSI
May 2018
533 pages
ISBN:9781450357241
DOI:10.1145/3194554
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 May 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. availability
  2. hardware trojans
  3. integrity

Qualifiers

  • Research-article

Funding Sources

  • German Research Foundation (DFG)

Conference

GLSVLSI '18
Sponsor:
GLSVLSI '18: Great Lakes Symposium on VLSI 2018
May 23 - 25, 2018
IL, Chicago, USA

Acceptance Rates

GLSVLSI '18 Paper Acceptance Rate 48 of 197 submissions, 24%;
Overall Acceptance Rate 312 of 1,156 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling ConceptsIEEE Access10.1109/ACCESS.2024.348027512(155666-155695)Online publication date: 2024
  • (2023)Enhancing Robustness and Reliability of Networks-on-Chip with Network Coding2023 IEEE Nordic Circuits and Systems Conference (NorCAS)10.1109/NorCAS58970.2023.10305485(1-7)Online publication date: 31-Oct-2023
  • (2022)Take a Bite of the Reality SandwichProceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3507657.3528539(207-221)Online publication date: 16-May-2022
  • (2021)Efficient Communication Protection of Many-Core Systems against Active AttackersElectronics10.3390/electronics1003023810:3(238)Online publication date: 21-Jan-2021
  • (2021)Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-CoresIEEE Access10.1109/ACCESS.2021.31274689(153142-153152)Online publication date: 2021
  • (2021)A Survey on the Security of Wired, Wireless, and 3D Network-on-ChipsIEEE Access10.1109/ACCESS.2021.31005409(107625-107656)Online publication date: 2021
  • (2020)ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message StreamsProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security10.1145/3372297.3423349(211-223)Online publication date: 30-Oct-2020
  • (2019)Lightweight Authenticated Encryption for Network-on-Chip CommunicationsProceedings of the 2019 Great Lakes Symposium on VLSI10.1145/3299874.3317990(33-38)Online publication date: 13-May-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media