2020 14th IEEE/ACM International Symposium on Networks-on-Chip (NOCS) 2020
DOI: 10.1109/nocs50636.2020.9241711
|View full text |Cite
|
Sign up to set email alerts
|

SECTAR: Secure NoC using Trojan Aware Routing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(16 citation statements)
references
References 14 publications
0
13
0
Order By: Relevance
“…HTs can also modify routing logic. Due to wrong route computation, a packet may travel in the wrong direction and exhibit a ping-pong effect [3]. Such HTs can significantly increase packet latency.…”
Section: Electronic Noc Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…HTs can also modify routing logic. Due to wrong route computation, a packet may travel in the wrong direction and exhibit a ping-pong effect [3]. Such HTs can significantly increase packet latency.…”
Section: Electronic Noc Securitymentioning
confidence: 99%
“…Since any module in the NoC mesh is oblivious of the location of the HT infected node, to mitigate HT at run-time, each router needs to have a mechanism to detect the presence of HTs, to help localize the node where an HT resides, and mitigate the impact of HT behavior. HT detection and localization using caging is a promising approach [3], [4]. The HT detection can be based on hashing of message digests and lightweight encryption mechanisms.…”
Section: Fig 3: Illustration Of Packet Rerouting In 8x8 Mesh Nocmentioning
confidence: 99%
“…For example, a Prime+Probe like side-channel attack is also proposed in NoC, where its infrastructure is used to monitor the contents of the shared LLC [11]. There are a wide variety of Trojan based attacks launched on NoC based SoCs like, eavesdropping [12][13], data integrity [14], information leakage [15][16], [17] [18], delay-of-service [19][20], performance degradation [21] [22], etc. Except [16], all other works actively use NoC resources to launch their attacks on the SoC.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…Trojan-aware routing was also adopted in [83] to address DoS attacks started by malicious routers. The assumed HT takes control of the router to misroute any packet heading to destinations located at the same column as the malicious router.…”
Section: Preserving Availabilitymentioning
confidence: 99%
“…There are critical problems with this HT detection scheme. First, latency is influenced by the network's workload, leading to false positives [83]. Second, using static thresholds may also lead to more false positives and false negatives in HT detection.…”
Section: Preserving Availabilitymentioning
confidence: 99%