A framework for security on NoC technologies

被引:31
|
作者
Gebotys, CH [1 ]
Gebotys, RJ [1 ]
机构
[1] Univ Waterloo, Waterloo, ON N2L 3G1, Canada
来源
ISVLSI 2003: IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, PROCEEDINGS: NEW TRENDS AND TECHNOLOGIES FOR VLSI SYSTEMS DESIGN | 2003年
关键词
D O I
10.1109/ISVLSI.2003.1183361
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multiple heterogeneous processor cores, memory cores and application specific IP cores integrated in a communication network, also known as Networks on chips (NoCs), will handle a large number of applications including security. Although NoCs offer more resistance to bus probing attacks, power/EM attacks and network snooping attacks are relevant. For the first time a framework for security on NoC at both the network level (or transport layer) and at the core level (or application layer) is proposed At the network level, each IP core has a security wrapper and a key-keeper core is included in the NoC protecting encrypted private and public keys. Using this framework, unencrypted keys are prevented from leaving the cores and NoC This is crucial to prevent untrusted software on or off the NoC from gaining access to keys. At the core level (application layer) the security framework is illustrated with software modification for resistance against power attacks with extremely low overheads in energy. With the emergence of secure IP cores in the market and nanometer technologies, a security framework for designing NoCs is crucial for supporting future wireless internet enabled devices.
引用
收藏
页码:113 / 117
页数:5
相关论文
共 50 条
  • [1] Security in MPSoCs: A NoC Firewall and an Evaluation Framework
    Grammatikakis, Miltos D.
    Papadimitriou, Kyprianos
    Petrakis, Polydoros
    Papagrigoriou, Antonis
    Kornaros, George
    Christoforakis, Ioannis
    Tomoutzoglou, Othon
    Tsamis, George
    Coppola, Marcello
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (08) : 1344 - 1357
  • [2] A Security Framework for NoC Using Authenticated Encryption and Session Keys
    Hemangee K. Kapoor
    G. Bhoopal Rao
    Sharique Arshi
    Gaurav Trivedi
    Circuits, Systems, and Signal Processing, 2013, 32 : 2605 - 2622
  • [3] A Security Framework for NoC Using Authenticated Encryption and Session Keys
    Kapoor, Hemangee K.
    Rao, G. Bhoopal
    Arshi, Sharique
    Trivedi, Gaurav
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2013, 32 (06) : 2605 - 2622
  • [4] A Comprehensive Framework for Systemic Security Management in NoC-Based Many-Cores
    Faccenda, Rafael Follmann
    Comaru, Gustavo
    Caimi, Luciano Lores
    Moraes, Fernando Gehm
    IEEE ACCESS, 2023, 11 : 131836 - 131847
  • [5] Information Security Risk Framework for Digital Transformation Technologies
    Stefani, Eduardo
    Costa, Ivanir
    Gaspar, Marcos Antonio
    Goes, Roberto de Souza
    Monteiro, Rogerio Carlos
    Petrili, Breno Ribeiro
    Pereira, Alexandre de Paula
    SYSTEMS, 2025, 13 (01):
  • [6] USF-PAS: Study on Core Security Technologies for Ubiquitous Security Framework
    Park, Jong Hyuk
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (05) : 1065 - 1080
  • [7] A NoC Emulation/Verification Framework
    Liu, Peng
    Xiang, Chunchang
    Wang, Xiaohang
    Xia, Binjie
    Liu, Yangfan
    Wang, Weidong
    Yao, Qingdong
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 859 - 864
  • [8] Analysis on Computer Communication Network and the Framework of the Network Security Technologies
    Li, Fengquan
    PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTER (MACMC 2017), 2017, 150 : 94 - 98
  • [9] Energy Security and Latin American NOC
    Ramirez Taza, R. Y.
    ENERGY SOURCES PART B-ECONOMICS PLANNING AND POLICY, 2014, 9 (04) : 342 - 350
  • [10] Review of packet switching technologies for future NoC
    Zydek, Dawid
    Shlayan, Neveen
    Regentova, Emma
    Selvaraj, Henry
    ICSENG 2008: INTERNATIONAL CONFERENCE ON SYSTEMS ENGINEERING, 2008, : 306 - 311