2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2016
DOI: 10.1109/isvlsi.2016.25
|View full text |Cite
|
Sign up to set email alerts
|

Gossip NoC -- Avoiding Timing Side-Channel Attacks through Traffic Management

Abstract: Abstract-The wide use of Multi-processing systems-on-chip (MPSoCs) in embedded systems and the trend to increase the integration between devices have turned these systems vulnerable to attacks. Malicious software executed on compromised IP may become a serious security problem. By snooping the traffic exchanged through the Network-on-chip (NoC), it is possible to infer sensitive information such as secrets keys. NoCs are vulnerable to side channel attacks that exploit traffic interference as timing channels. W… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 44 publications
(31 citation statements)
references
References 20 publications
0
31
0
Order By: Relevance
“…By monitoring the NoC traffic throughput the sensitive information is leaked. In addition, in this work we verify the timing security of a low area overhead timing protected NoC Gossip NoC [17]. The main contributions of our work are:…”
Section: Introductionmentioning
confidence: 95%
“…By monitoring the NoC traffic throughput the sensitive information is leaked. In addition, in this work we verify the timing security of a low area overhead timing protected NoC Gossip NoC [17]. The main contributions of our work are:…”
Section: Introductionmentioning
confidence: 95%
“…As a consequence of the malicious traffic, delays in the communication are caused and thus the malicious packets transmission is also delayed. At an endpoint at the other non-secured core, the adversary is able to measure the latency of their malicious traffic and infer how many collisions This threat model is not new, and its variations have also been used in best-effort NoC-based systems by [15], [16], [7]. The timing nature of the threat is also the same used in hard real-time uniprocessor systems by [17].…”
Section: Threat Model and Timing Side Channel Attacksmentioning
confidence: 99%
“…This triggers a cache attack, where the attacker perform a read request to the shared memory in IP 0 in step (6). As is [7] and [6], by reading the shared cache in step (7), the attacker can identify the memory sets accessed due the AES encryption. As a result a key candidate is obtained.…”
Section: Aes Noc Timing Attack Case Studymentioning
confidence: 99%
See 1 more Smart Citation
“…Timing Attacks: An analytical side-channel attack that exploits computational and communication data interactions on crypto-processing systems [25]. Ensuring all received JWTs are duly verified in a lucid and succinct verification contract of allowed crypto "alg", and other payload/header data cum the use of the "kid" makes the verification cut in stone without undergoing unauthorized mutation.…”
Section: A Security Mitmmentioning
confidence: 99%