2019
DOI: 10.1145/3358212
|View full text |Cite
|
Sign up to set email alerts
|

Unified Testing and Security Framework for Wireless Network-on-Chip Enabled Multi-Core Chips

Abstract: On-chip wireless interconnects have been demonstrated to improve the performance and energy consumption of data communication in Network-on-Chips (NoCs). However, the wireless interfaces (WIs) can be defective, rendering these broken links severely affect the performance. This makes manufacturing test of the WIs critical. While analog testing of the transceivers is possible, such methodologies are impractical in a Wireless NoC (WiNoC) due to large overheads. In addition to testing, security is another prominen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 24 publications
0
14
0
Order By: Relevance
“…Machine learning (ML)-based techniques [27], [57] seem promising as the stateof-the-art ML classifiers are utilized to detect HTs effectively. A built-in-self test based methodology is presented in [58] V. CONCLUSION In this work, we surveyed the state-of-the-art works that focus on the HT design and their implementation on various hardware platforms. HTs can do severe damage to the cyberphysical systems, as we observe from the discussion.…”
Section: Defenses Against Hardware Trojansmentioning
confidence: 99%
“…Machine learning (ML)-based techniques [27], [57] seem promising as the stateof-the-art ML classifiers are utilized to detect HTs effectively. A built-in-self test based methodology is presented in [58] V. CONCLUSION In this work, we surveyed the state-of-the-art works that focus on the HT design and their implementation on various hardware platforms. HTs can do severe damage to the cyberphysical systems, as we observe from the discussion.…”
Section: Defenses Against Hardware Trojansmentioning
confidence: 99%
“…To protect the chip against possible external eavesdroppers, the authors used a simple data scrambling approach in the form of XORing the flits with the same (periodically changing) key. For internal eavesdropping attacks, though, they have equipped the input port with a low [108], [109].…”
Section: Wireless Nocs Countermeasuresmentioning
confidence: 99%
“…Violating WIs will be shut down by the power management unit to turn off that malicious WI. However, this mechanism would fail to protect the system in case of broadcast packets [108], [109].…”
Section: Wireless Nocs Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…However, with increasing number of security zones, it is hard to reduce inter-zone traffic and requires complicated scheduling policy. Recent works such as [9], [10], [11] propose detection of HTs in NOCs, but are limited to detecting HTs leading to eavesdropping and DoS attacks. In [12], authors proposed Non-Interference Based adaptive (NIBR) Routing to secure NoCs from side channel and DoS attacks.…”
Section: Introductionmentioning
confidence: 99%