2016
DOI: 10.1109/tr.2016.2606883
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Dependable NoC-Connected Systems on an FPGA Chip

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 30 publications
1
5
0
Order By: Relevance
“…On the other hand, the malicious attacks for electronic transmission of ΔP values within E-net are similar to those modeled in the previous relevant works in the NoCs [18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36]. After all, as one sort of control data, the temperature information is also prone to be under data leakage and manipulation as mentioned [41,42], causing negative impacts on the performance and reliability of ONoCs.…”
Section: Figure 6: An Mr-based Thermal Sensor With Hts For Onocssupporting
confidence: 69%
See 2 more Smart Citations
“…On the other hand, the malicious attacks for electronic transmission of ΔP values within E-net are similar to those modeled in the previous relevant works in the NoCs [18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36]. After all, as one sort of control data, the temperature information is also prone to be under data leakage and manipulation as mentioned [41,42], causing negative impacts on the performance and reliability of ONoCs.…”
Section: Figure 6: An Mr-based Thermal Sensor With Hts For Onocssupporting
confidence: 69%
“…7) Mixed scheme. [33] proposed an integrated runtime solution for both security and fault tolerance of SoCs based on the field-programmable gate array (FPGA) through digital signatures, live monitoring, partial reconfiguration, and adaptive routing supported by an ENoC called X-Network that can reduce the ratio of required routers versus PEs to facilitate security designs and fault tolerance. In [34], authors offered Fort-NoCs, a series of techniques including data scrambling, packet certification, and node obfuscation, to disable covert backdoor activation and reduce the chance of encountering the side-channel attacks by "clouding" the information obtained by the attackers for defense against the compromised ENoC in MPSoC.…”
Section: Related Work and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…The major malicious behaviors along this line include denial of service (DoS) [107], linker behavior [26], [27], and router behavior [108], which are launched by HTs implanted in links or routers. Attackers may exploit covert communication [73], [109], bus idle states [110], and peripheral interfaces [28] to disclose confidential information, tamper with communication data, interfere with normal operations, and perform DoS attacks.…”
Section: -Implantation Preventionmentioning
confidence: 99%
“…However, these architectures fail to meet the scalability issues. The NoC provides scalability solutions by replacing current bus-based architecture with an interconnected network for SoC's [1]. To provide high performance and low power requirements in SoC's, the NoC provides the communication platform among the IP cores.…”
Section: Introductionmentioning
confidence: 99%