Fort-Nocs: Mitigating The Threat Of A Compromised Noc

DAC(2014)

引用 148|浏览57
暂无评分
摘要
In this paper, we uncover a novel and imminent threat to an emerging computing paradigm: MPSoCs built with 3rd party IP NoCs. We demonstrate that a compromised NoC (C-NoC) can enable a range of security attacks with an accomplice software component. To counteract these threats, we propose Fort-NoCs, a series of techniques that work together to provide protection from a C-NoC in an MPSoC. Fort-NoCs's foolproof protection disables covert backdoor activation, and reduces the chance of a successful side-channel attack by "clouding" the information obtained by an attacker. Compared to recently proposed techniques, Fort-NoCs offers a substantially better protection with lower overheads.
更多
查看译文
关键词
cryptography,industrial property,multiprocessing systems,network-on-chip,3rd party IP NoCs,MPSoCs,accomplice software component,backdoor activation,compromised NoC,fort-NoCs foolproof protection,security attacks,side-channel attack,
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要