2015
DOI: 10.1007/978-3-319-23165-5_19
|View full text |Cite
|
Sign up to set email alerts
|

Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware

Abstract: Mobile devices are in roles where the integrity and confidentiality of their apps and data are of paramount importance. They usually contain a System-onChip (SoC), which integrates microprocessors and peripheral Intellectual Property (IP) connected by a Network-on-Chip (NoC). Malicious IP or software could compromise critical data. Some types of attacks can be blocked by controlling data transfers on the NoC using Memory Management Units (MMUs) and other access control mechanisms. However, commodity processors… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…A representative work listing different type of threats is described in [11]. In our case, we are not concerned about physical attacks against the SoC, such as fault injection, sidechannel analysis, and chip rewriting.…”
Section: Threat Modelmentioning
confidence: 99%
“…A representative work listing different type of threats is described in [11]. In our case, we are not concerned about physical attacks against the SoC, such as fault injection, sidechannel analysis, and chip rewriting.…”
Section: Threat Modelmentioning
confidence: 99%
“…Our novelty lies in that we model an STNoC instanceits router, link and network interface -in a cycle-accurate way in the gem5 environment, by designing a 2-stage pipeline switch based on gem5's garnet fixed pipeline router. We also take into account the security mechanism as an integral part of the system, which appears to be an interesting research subject [9], [10]. Our results incorporate the overhead of the NoC firewall integrated with the network interface, presented in detail in [1], [2].…”
Section: Background and Motivationmentioning
confidence: 99%