2017 12th International Symposium on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC) 2017
DOI: 10.1109/recosoc.2017.8016142
|View full text |Cite
|
Sign up to set email alerts
|

Side-channel attack resilience through route randomisation in secure real-time Networks-on-Chip

Abstract: Abstract-Security can be seen as an optimisation objective in NoC resource management, and as such poses trade-offs against other objectives such as real-time schedulability. In this paper, we show how to increase NoC resilience against a concrete type of security attack, named side-channel attack, which exploit the correlation between specific non-functional properties (such as packet latencies and routes, in the case of NoCs) to infer the functional behaviour of secure applications. For instance, the transmi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 32 publications
1
9
0
Order By: Relevance
“…In this paper, we concentrate on a threat model based on packet timing. This paper extends our earlier conference paper work upon security through routing randomisation in NoCs [9]. In summary, the contributions of our total work upon this idea are:…”
Section: Introductionsupporting
confidence: 54%
See 2 more Smart Citations
“…In this paper, we concentrate on a threat model based on packet timing. This paper extends our earlier conference paper work upon security through routing randomisation in NoCs [9]. In summary, the contributions of our total work upon this idea are:…”
Section: Introductionsupporting
confidence: 54%
“…IoT context due to the interaction between secure and malicious downloaded code communicating over a shared NoC. A novel case study involving an autonomous vehicle is added in this paper, over that presented in [9].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…These countermeasures can profoundly enhance data confidentiality, while they might not be able to address DoS attacks such as packet misrouting, packet dropping, and packet tampering. Routers are literally the first line of defense, so researchers have also used routers to integrate their security solutions [32], [35], [36], [51], [52]. Suppose a packet injected by a malicious task is heading towards a secured zone of the network to carry out an attack, e.g., timing attack, spoofing attack, etc.…”
Section: Wired Nocs Countermeasuresmentioning
confidence: 99%
“…DoS attacks on a many-core chip can target different components of the chip, including the memory system [15], and the network-on-chip (NoC) [16], [17]. With the help of hardware Trojans (HTs) [3], [4], [13], DoS attacks can be classified as 1) flooding attack [18], [19], where a large volume of useless packets floods a victim node and saturates it; 2) packet drop attack, where some packets are dropped or directed to some malicious nodes so that the victim node can never receive a single packet designated to it [20]; 3) privilege escalation attack [21], where an average user process is granted the privileges of a supervisor so that it can steal passwords; and 4) routing loop attack [2], where packets that pass the malicious node will be routed back to the source node, effectively blocking the source core from communicating with any other cores.…”
Section: B Dos Attackmentioning
confidence: 99%