1. Runtime Detection of a Bandwidth Denial Attack from a Rogue Network-on-Chip
- Author
-
Dean Michael Ancajas, Koushik Chakraborty, Sanghamitra Roy, Rajesh Js, and Association for Computing Machinery
- Subjects
Hardware trojan ,business.industry ,Computer science ,Hardware_PERFORMANCEANDRELIABILITY ,MPSoC ,Electrical and Computer Engineering ,Chip ,Network-on-chip ,Network on a chip ,Software ,Engineering ,Bandwidth denial ,Hardware Trojan ,Integrator ,Embedded system ,Threat model ,Latency (engineering) ,business ,Computer network - Abstract
In this paper, we propose a covert threat model for MPSoCs designed using 3rd party Network-on-Chips (NoC). We illustrate that a malicious NoC can disrupt the availability of on-chip resources, thereby causing large performance bottlenecks for the software running on the MPSoC platform. We then propose a runtime latency auditor that enables an MPSoC integrator to monitor the trustworthiness of the deployed NoC throughout the chip lifetime. For the proposed technique, our comprehensive cross-layer analysis indicates modest overheads of 12.73% in area, 9.844% in power and 5.4% in terms of network latency.
- Published
- 2015