Packet Header Attack by Hardware Trojan in NoC based TCMP and its Impact Analysis

被引:16
|
作者
Kulkarni, Vedika J. [1 ]
Manju, R. [1 ]
Gupta, Ruchika [1 ]
Jose, John [1 ]
Nandi, Sukumar [1 ]
机构
[1] Indian Inst Technol Guwahati, Dept Comp Sci & Engn, Gauhati, Assam, India
关键词
Hardware Trojan; Network-on-Chip Security; Secured TCMP design; Trojan Impact; Packet Header Attack;
D O I
10.1145/3479876.3481597
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancement of VLSI technology, Tiled Chip Multicore Processors (TCMP) with packet switched Network-on-Chip (NoC) have been emerged as the backbone of the modern data intensive parallel systems. Due to tight time-to-market constraints, manufacturers are exploring the possibility of integrating several third-party Intellectual Property (IP) cores in their TCMP designs. Presence of malicious Hardware Trojan (HT) in the NoC routers can adversely affect communication between tiles leading to degradation of overall system performance. In this paper, we model an HT mounted on the input buffers of NoC routers that can alter the destination address field of selected NoC packets. We study the impact of such HTs and analyse its first and second order impacts at the core level, cache level, and NoC level both quantitatively and qualitatively. Our experimental study shows that the proposed HT can bring application to a complete halt by stalling instruction issue and can significantly impact the miss penalty of L1 caches. The impact of re-transmission techniques in the context of HT impacted packets getting discarded is also studied. We also expose the unrealistic assumptions and unacceptable latency overheads of existing mitigation techniques for packet header attacks and emphasise the need for alternative cost effective HT management techniques for the same.
引用
收藏
页码:21 / 28
页数:8
相关论文
共 50 条
  • [31] Hardware Trojan detection method based on combined features analysis
    Zhao Y.
    Li B.
    Ma H.
    He J.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2021, 49 (05): : 1 - 6
  • [32] INFECT: INiconspicuous FEC-based Trojan: a Hardware Attack on an 802.11 a/g Wireless Network
    Subramani, Kiruba Sankaran
    Antonopoulos, Angelos
    Abotabl, Ahmed Attia
    Nosratinia, Aria
    Makris, Yiorgos
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 90 - 94
  • [33] DARK-Adders: Digital Hardware Trojan Attack on Block-based Approximate Adders
    Mishra, Vishesh
    Hassan, Neelofar
    Mehta, Akshay
    Chatterjee, Urbi
    2023 36TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2023 22ND INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, VLSID, 2023, : 371 - 376
  • [34] A CatBoost Based Approach to Detect Label Flipping Poisoning Attack in Hardware Trojan Detection Systems
    Richa Sharma
    G. K. Sharma
    Manisha Pattanaik
    Journal of Electronic Testing, 2022, 38 : 667 - 682
  • [35] Hardware Trojan attacks on voltage scaling-based side-channel attack countermeasure
    Yu, Weize
    IET CIRCUITS DEVICES & SYSTEMS, 2019, 13 (03) : 321 - 326
  • [36] A CatBoost Based Approach to Detect Label Flipping Poisoning Attack in Hardware Trojan Detection Systems
    Sharma, Richa
    Sharma, G. K.
    Pattanaik, Manisha
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2022, 38 (06): : 667 - 682
  • [37] FPGA Implementation of Traffic Light Controller and its Analysis in the Presence of Hardware Trojan
    Bhardwaj, Aastha
    Chhabra, Surbhi
    Lata, Kusum
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 375 - 380
  • [38] Side Channel Analysis of Hardware Trojan Based on Smooth Filtering Algorithm
    Zhang, Zixuan
    Li, Lei
    Tang, Tang
    Wei, Zhengyou
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 192 - 195
  • [39] FPGA Based Implementation of a Floating Point Multiplier and its Hardware Trojan Models
    Nikhila, S.
    Yamuna, B.
    Balasubramanian, Karthi
    Mishra, Deepak
    2019 IEEE 16TH INDIA COUNCIL INTERNATIONAL CONFERENCE (IEEE INDICON 2019), 2019,
  • [40] An efficient methodology for hardware Trojan detection based on canonical correlation analysis
    Yu, Weize
    Wang, Yubing
    MICROELECTRONICS JOURNAL, 2021, 115