2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) 2020
DOI: 10.1109/dft50435.2020.9250906
|View full text |Cite
|
Sign up to set email alerts
|

A novel Network-on-Chip security algorithm for tolerating Byzantine faults

Abstract: Since the number of processors and cores on a single chip is increasing, the interconnection among them becomes significant. Network-on-Chip (NoC) has direct access to all resources and information within a System-on-Chip (SoC), rendering it appealing to attackers. Malicious attacks targeting NoC are a major cause of performance depletion and they can cause arbitrary behavior of links or routers, that is, Byzantine faults. Byzantine faults have been thoroughly investigated in the context of Distributed systems… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…Due to the latency and overhead, many solutions opt for a lightweight countermeasure. For example, arbitrary failure like the Byzantine fault is addressed in [24], where these faults are caused by HTs or DoS attacks, targeting the network's availability. A lightweight handshake mechanism with ACKs and ALERT messages is implemented to ensure the delivery of packets and detect malicious nodes, respectively.…”
Section: Noc Security Attacks and Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the latency and overhead, many solutions opt for a lightweight countermeasure. For example, arbitrary failure like the Byzantine fault is addressed in [24], where these faults are caused by HTs or DoS attacks, targeting the network's availability. A lightweight handshake mechanism with ACKs and ALERT messages is implemented to ensure the delivery of packets and detect malicious nodes, respectively.…”
Section: Noc Security Attacks and Countermeasuresmentioning
confidence: 99%
“…In this case, it monitors the number of Request-to-Send signals using temporal duration to classify the attack. However, this method's accuracy depends on the duration of the attack in the temporal sample, as accuracy increases from 60% to 87% when the attack duration progresses from 30% Lightweight handshake authentication [24] Increased latency by a factor of 10-40%.…”
Section: Noc Security Attacks and Countermeasuresmentioning
confidence: 99%
“…System reliability is affected by the faults that the system may incur, so many researchers have designed architectures and management schemes to anticipate and avoid certain types of failures. The types of failures identified within systems-on-chip, especially in new MPSoCs, fall into three main categories: transient, permanent, and intermittent faults [149]. These failures are caused by effects such as soft (cosmic) errors, crosstalk, electromagnetic interference (EMI), intersymbol interfer-ence, noise, electromigration, and aging of materials [150,151].…”
mentioning
confidence: 99%
“…Transient faults have a random behavior occurring in one or several execution cycles, while permanent are due to wholly damaged components that cause logic faults or operation delays. Intermittent faults have repetitive behavior and occur in the same place [149]. Several MPSoCs include spare structures to tolerate some of these failures, leveraging the increased number of processing elements.…”
mentioning
confidence: 99%