2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS) 2015
DOI: 10.1109/icecs.2015.7440312
|View full text |Cite
|
Sign up to set email alerts
|

A non-intrusive and reconfigurable access control to secure NoCs

Abstract: Following the current trend in the semiconductor industry (MPSoC) and the massive advances presented by all things interconnected (Internet of Things), a massive quantity of private and metadata is being transferred through insecure channels. In the industry, almost no attention is given to the amount of data that can be collected from different individuals, just by getting access to their house appliances. With that in mind, this paper proposes a non-intrusive and reconfigurable access control architecture fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…Memory is divided into regions, and each island can only access its dedicated address range. Few dynamic firewalls have been proposed in the literature [90], [92], [96]. Cioranesco et al [90] argue that authenticated encryption between the initiator and the target imposes a significant latency overhead.…”
Section: [93]-mentioning
confidence: 99%
See 2 more Smart Citations
“…Memory is divided into regions, and each island can only access its dedicated address range. Few dynamic firewalls have been proposed in the literature [90], [92], [96]. Cioranesco et al [90] argue that authenticated encryption between the initiator and the target imposes a significant latency overhead.…”
Section: [93]-mentioning
confidence: 99%
“…Fernandes et al [96] have proposed a firewall placed between the NI and the routers' local ports. The firewall offers two security services: i) restricts unauthorized accesses issued by malicious initiators, and ii) compares the NI-produced packet's header-flit with an internal register within the firewall to detect any malicious tampering with the header information.…”
Section: [93]-mentioning
confidence: 99%
See 1 more Smart Citation
“…These firewalls can either be static or dynamic. The static firewall has fixed access rules [35] while the re-configurable firewalls update the security policy regularly [43,44,45]. It is assumed that the IP cores inside a security zone trust each other.…”
Section: Firewall Protectionmentioning
confidence: 99%
“…Memory protection was previously enforced by security wrappers integrated in the interface between the IP hardware cores and the communication structure as in [18,1,34,10,12,8,11,9,13]. These firewall-based approaches have shown to be an effective isolation mechanism.…”
Section: Related Workmentioning
confidence: 99%