2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) 2020
DOI: 10.1109/asianhost51057.2020.9358250
|View full text |Cite
|
Sign up to set email alerts
|

Defense Against on-Chip Trojans Enabling Traffic Analysis Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“…Ahmed et al [4] proposed a lightweight and naive HT that can leak traffic patterns to an adversary so that the adversary can do traffic analysis. The HT is capable of the naive task of periodically counting number of packets in a time window and leak that information to the adversary.…”
Section: Electrical Linksmentioning
confidence: 99%
See 3 more Smart Citations
“…Ahmed et al [4] proposed a lightweight and naive HT that can leak traffic patterns to an adversary so that the adversary can do traffic analysis. The HT is capable of the naive task of periodically counting number of packets in a time window and leak that information to the adversary.…”
Section: Electrical Linksmentioning
confidence: 99%
“…After stealing information, the HT will packetize and transfer the information to remote attacker for further processing. Similar to [4], the attacker uses a ML technique, specifically an artificial neural network, to infer properties of application running on the system and reverse engineer the architectural design. The authors shows that it can reveal information such as router micro-architecture, cache organization, processor platform, and NoC configurations.…”
Section: Electrical Linksmentioning
confidence: 99%
See 2 more Smart Citations
“…In our attack model, we assume one or more NoC switches in the system to be infected with the HT. While research has proposed the design of HTs to count the number of packets, such as the one in [23], reading the destination is a new design concept. The HT design proposed in [23] uses one counter per switch and tallies the total packets through the infected switch.…”
Section: Hardware Trojan (Ht) Designmentioning
confidence: 99%