Packet Header Attack by Hardware Trojan in NoC based TCMP and its Impact Analysis

被引:16
|
作者
Kulkarni, Vedika J. [1 ]
Manju, R. [1 ]
Gupta, Ruchika [1 ]
Jose, John [1 ]
Nandi, Sukumar [1 ]
机构
[1] Indian Inst Technol Guwahati, Dept Comp Sci & Engn, Gauhati, Assam, India
关键词
Hardware Trojan; Network-on-Chip Security; Secured TCMP design; Trojan Impact; Packet Header Attack;
D O I
10.1145/3479876.3481597
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancement of VLSI technology, Tiled Chip Multicore Processors (TCMP) with packet switched Network-on-Chip (NoC) have been emerged as the backbone of the modern data intensive parallel systems. Due to tight time-to-market constraints, manufacturers are exploring the possibility of integrating several third-party Intellectual Property (IP) cores in their TCMP designs. Presence of malicious Hardware Trojan (HT) in the NoC routers can adversely affect communication between tiles leading to degradation of overall system performance. In this paper, we model an HT mounted on the input buffers of NoC routers that can alter the destination address field of selected NoC packets. We study the impact of such HTs and analyse its first and second order impacts at the core level, cache level, and NoC level both quantitatively and qualitatively. Our experimental study shows that the proposed HT can bring application to a complete halt by stalling instruction issue and can significantly impact the miss penalty of L1 caches. The impact of re-transmission techniques in the context of HT impacted packets getting discarded is also studied. We also expose the unrealistic assumptions and unacceptable latency overheads of existing mitigation techniques for packet header attacks and emphasise the need for alternative cost effective HT management techniques for the same.
引用
收藏
页码:21 / 28
页数:8
相关论文
共 50 条
  • [41] An FPGA Hardware Trojan Detection Approach Based on Multiple Parameter Analysis
    Fournaris, Apostolos P.
    Pyrgas, Lampros
    Kitsos, Paris
    2018 21ST EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2018), 2018, : 516 - 522
  • [42] Side channel analysis-based modeling and optimizing of hardware Trojan
    Liu, Changlong
    Zhao, Yiqiang
    Shi, Yafeng
    Feng, Zizhu
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2013, 41 (02): : 53 - 57
  • [43] A Hardware Trojan Detection Method Based on Compression Marginal Fisher Analysis
    Wang Xiaohan
    Wang Tao
    Li Xiongwei
    Zhang Yang
    Huang Changyang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (12) : 3043 - 3050
  • [44] A Hardware Trojan Detection Method Based on Side-channel Analysis
    Wang Xiaohan
    Li Xiongwei
    Xu Lu
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1042 - 1047
  • [45] Graph-based approach towards hardware Trojan vulnerability analysis
    Islam, S. A.
    ELECTRONICS LETTERS, 2020, 56 (17) : 868 - 870
  • [46] Hierarchical hardware trojan for LUT-based AI devices and its evaluation
    Nozaki, Yusuke
    Takemoto, Shu
    Ikezaki, Yoshiya
    Yoshikawa, Masaya
    ELECTRONICS AND COMMUNICATIONS IN JAPAN, 2022, 105 (01)
  • [47] Hierarchical Hardware Trojan for LUT-based AI Devices and its Evaluation
    Nozaki, Yusuke
    Takemoto, Shu
    Ikezaki, Yoshiya
    Yoshikawa, Masaya
    IEEJ Transactions on Electronics, Information and Systems, 2021, 141 (12): : 1234 - 1240
  • [48] An Efficient ML -based Hardware Trojan Localization Framework for RTL Security Analysis
    Fan, Ruchao
    Tang, Yongming
    Sun, Hao
    Liu, Jiyuan
    Li, He
    2024 ACM/IEEE 6TH SYMPOSIUM ON MACHINE LEARNING FOR CAD, MLCAD 2024, 2024,
  • [49] A Viterbi decoder and its hardware Trojan models: an FPGA-based implementation study
    Kakkara, Varsha
    Balasubramanian, Karthi
    Yamuna, B.
    Mishra, Deepak
    Lingasubramanian, Karthikeyan
    Murugan, Senthil
    PEERJ COMPUTER SCIENCE, 2020, 6 (03): : 1 - 21
  • [50] A Statistical Test Generation Based on Mutation Analysis for Improving the Hardware Trojan Detection
    Liu, Yanjiang
    Zhao, Yiqiang
    He, Jiaji
    Xin, Ruishan
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2020, 29 (03)