A framework for security on NoC technologies

被引:31
|
作者
Gebotys, CH [1 ]
Gebotys, RJ [1 ]
机构
[1] Univ Waterloo, Waterloo, ON N2L 3G1, Canada
来源
ISVLSI 2003: IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, PROCEEDINGS: NEW TRENDS AND TECHNOLOGIES FOR VLSI SYSTEMS DESIGN | 2003年
关键词
D O I
10.1109/ISVLSI.2003.1183361
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multiple heterogeneous processor cores, memory cores and application specific IP cores integrated in a communication network, also known as Networks on chips (NoCs), will handle a large number of applications including security. Although NoCs offer more resistance to bus probing attacks, power/EM attacks and network snooping attacks are relevant. For the first time a framework for security on NoC at both the network level (or transport layer) and at the core level (or application layer) is proposed At the network level, each IP core has a security wrapper and a key-keeper core is included in the NoC protecting encrypted private and public keys. Using this framework, unencrypted keys are prevented from leaving the cores and NoC This is crucial to prevent untrusted software on or off the NoC from gaining access to keys. At the core level (application layer) the security framework is illustrated with software modification for resistance against power attacks with extremely low overheads in energy. With the emergence of secure IP cores in the market and nanometer technologies, a security framework for designing NoCs is crucial for supporting future wireless internet enabled devices.
引用
收藏
页码:113 / 117
页数:5
相关论文
共 50 条
  • [41] Distributed On-Chip Power Supply for Security Enhancement in Multicore NoC
    Liu, Xingye
    Ampadu, Paul
    34TH IEEE INTERNATIONAL SYSTEM ON CHIP CONFERENCE (SOCC), 2021, : 212 - 217
  • [42] SeVNoC: Security Validation of System-on-Chip Designs With NoC Fabrics
    Meng, Xingyu
    Raj, Kshitij
    Ray, Sandip
    Basu, Kanad
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (02) : 672 - 682
  • [43] Intelligent approaches for security technologies
    Choi, Chang
    Ogiela, Marek R.
    Chen, Hsing-Chung
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (03):
  • [44] Health technologies and computer security
    不详
    LANCET, 2014, 384 (9951): : 1322 - 1322
  • [45] On the security implications of disruptive technologies
    Robinson, Neil
    Valeri, Lorenzo
    CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 : 3 - 14
  • [46] Overview of Memory Security Technologies
    Hashimoto, Mikio
    2021 INTERNATIONAL SYMPOSIUM ON VLSI TECHNOLOGY, SYSTEMS AND APPLICATIONS (VLSI-TSA), 2021,
  • [47] The Research of Network Security Technologies
    Wang, Zhen
    Liu, Zhijie
    Xie, Xiaoyao
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 585 - 587
  • [48] Emerging technologies for homeland security
    Yen, J
    COMMUNICATIONS OF THE ACM, 2004, 47 (03) : 32 - 35
  • [49] A taxonomy for information security technologies
    Venter, HS
    Eloff, JHP
    COMPUTERS & SECURITY, 2003, 22 (04) : 299 - 307
  • [50] Advances in Mobile Security Technologies
    Yi, Jeong Hyun
    Mohaisen, Aziz
    Yang, Sean
    Hsu, Ching-Hsien
    MOBILE INFORMATION SYSTEMS, 2016, 2016