SECTAR: Secure NoC using Trojan Aware Routing

被引:24
作者
Manju, R. [1 ]
Das, Abhijit [1 ]
Jose, John [1 ]
Mishra, Prabhat [2 ]
机构
[1] Indian Inst Technol Guwahati, Gauhati, Assam, India
[2] Univ Florida, Gainesville, FL USA
来源
2020 14TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON NETWORKS-ON-CHIP (NOCS) | 2020年
关键词
Hardware Trojan; Network-on-Chip Security; MITIGATION;
D O I
10.1109/nocs50636.2020.9241711
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
System-on-Chips (SoCs) are designed using different Intellectual Property (IP) blocks from multiple third-party vendors to reduce design cost while meeting aggressive time-to-market constraints. Designing trustworthy SoCs need to address the increasing concerns related to supply-chain security vulnerabilities. Malicious implants on IPs, such as Hardware Trojans (HTs) are one of the significant security threats in designing trust-worthy SoCs. It is a major challenge to detect Trojans in complex multi-processor SoCs using conventional pre- and post-silicon validation methodologies. Packet-based Network-on-Chip (NoC) is a widely used solution for on-chip communication between IPs in complex SoCs. The focus of this paper is to enable trusted NoC communication in the presence of potentially untrusted IPs. This paper makes three key contributions. (1) We model an HT in NoC router that activates misrouting of the packets to initiate a denial of service, delay of service, and injection suppression. (2) We propose a dynamic shielding technique that isolates the identified HT infected IP. (3) We present a secure routing algorithm to bypass the HT infected NoC router. Experimental results on HT infected NoC demonstrate that the proposed method reduces effective average packet latency by 38% in real benchmarks and 48% in synthetic traffic patterns. Our method also increases throughput and reduces effective average deflected packet latency by 62% in real benchmarks and 97% in synthetic traffic patterns.
引用
收藏
页数:8
相关论文
共 21 条
[1]  
Ancajas Dean Michael, 2014, DAC
[2]  
[Anonymous], A comparison of network-on-chip and busses
[3]  
[Anonymous], 2004, Principles and Practices of Interconnection Networks
[4]  
[Anonymous], 2012, 2012 IEEE ACM 6 INT
[5]   Hardware Trojan Attacks: Threat Analysis and Countermeasures [J].
Bhunia, Swarup ;
Hsiao, Michael S. ;
Banga, Mainak ;
Narasimhan, Seetharam .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1229-1247
[6]   Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs [J].
Boraten, Travis ;
Kodi, Avinash .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 111 :24-38
[7]  
Charles S, 2019, DES AUT TEST EUROPE, P1160, DOI [10.23919/date.2019.8715009, 10.23919/DATE.2019.8715009]
[8]  
Coburn J., 2005, CASES
[9]  
Daoud L, 2018, MIDWEST SYMP CIRCUIT, P775, DOI 10.1109/MWSCAS.2018.8623972
[10]  
Das A, 2018, INT SYMP NETW CHIP