2018 IEEE 9th Latin American Symposium on Circuits &Amp; Systems (LASCAS) 2018
DOI: 10.1109/lascas.2018.8399914
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the cost to cipher the NoC communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…If the NIs are assumed trusted (in-house design), the countermeasure(s) can be integrated within the NI units. Many researchers have integrated their security solutions in the NI units, e.g., bulky modules for symmetric and asymmetric cryptography [40], [49], [50]. Also, most countermeasures that guarantee secure memory access are implemented in the NI.…”
Section: Wired Nocs Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…If the NIs are assumed trusted (in-house design), the countermeasure(s) can be integrated within the NI units. Many researchers have integrated their security solutions in the NI units, e.g., bulky modules for symmetric and asymmetric cryptography [40], [49], [50]. Also, most countermeasures that guarantee secure memory access are implemented in the NI.…”
Section: Wired Nocs Countermeasuresmentioning
confidence: 99%
“…Oliveira et al [49] aimed at measuring the latency overhead of AES encryption when used between the NI and the router. The proposed architecture consists of a manager element that generates unique random keys for each communication session.…”
Section: A Data Confidentiality Countermeasuresmentioning
confidence: 99%
“…Oliveira et al [33] propose an architecture that includes a firewall capable of filtering incoming and outgoing NoC traffic, an AES cipher block to encrypt the NoC flow and, an auxiliary NoC that use a Hamiltonian path to configure the firewall rules and distribute the keys. Figure 7 presents the interfaces connected to the firewall.…”
Section: (Vi) Cryptographymentioning
confidence: 99%
“…Santana et al [48] extend the aforementioned work [33], by adopting four security countermeasures: spatial isolation of applications, a dedicated network to send sensitive data, filters to block malicious traffic, lightweight cryptography. This proposal is decoupled from the M CSoC architecture, protecting the system from attacks, such as Denial of Service and man-in-the-middle, ensuring confidentiality and in-tegrity to applications.…”
Section: (Vi) Cryptographymentioning
confidence: 99%
“…Table 1 presents a broad overview of works covering security for applications executing in MCSoCs. The Table shows the adoption of different methods, including Physical Unclonable Function (PUF) and Message Authentication Code (MAC) [10], firewalls [11]- [13], encryption [12,13], temporal communication partition [14], packet validation [15], routing schemes [16], and Secure Zones (SZ).…”
Section: Introductionmentioning
confidence: 99%