基于密钥认证和混淆技术的NoC硬件木马检测与缓解

IF 0.4 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC EMITTER-International Journal of Engineering Technology Pub Date : 2022-12-30 DOI:10.24003/emitter.v10i2.716
Thejaswini P, V. G, Anu H, Priya R, Krishna Prasad B S, Nischay M
{"title":"基于密钥认证和混淆技术的NoC硬件木马检测与缓解","authors":"Thejaswini P, V. G, Anu H, Priya R, Krishna Prasad B S, Nischay M","doi":"10.24003/emitter.v10i2.716","DOIUrl":null,"url":null,"abstract":"Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency. NoC is a communication architecture used in the processor cores to transfer  data from source to destination through several nodes. Since NoC deals with on-chip interconnection for data transmission, it will be a good prey for data leakage and other security attacks. One such way of attacking is done by a third-party vendor introducing Hardware Trojans (HTs) into routers of NoC architecture. This can cause packets to traverse in wrong paths, leak/extract information and cause Denial-of-Service (DoS) degrading the system performance. In this paper, a novel HT detection and mitigation approach using obfuscation and key-based authentication technique is proposed. The proposed technique prevents any illegal transitions between routers thereby protecting data from malicious activities, such as packet misrouting and information leakage. The proposed technique is evaluated on a 4x4 NoC architecture under synthetic traffic pattern and benchmarks, the hardware model is synthesized in Cadence Tool with 90nm technology. The introduced Hardware Trojan affects 8% of packets passing through infected router. Experimental results demonstrate that the proposed technique prevents those 10-15% of packets infected from the HT effect. Our proposed work has negligible power and area overhead of 8.6% and  2% respectively.","PeriodicalId":40905,"journal":{"name":"EMITTER-International Journal of Engineering Technology","volume":null,"pages":null},"PeriodicalIF":0.4000,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques\",\"authors\":\"Thejaswini P, V. G, Anu H, Priya R, Krishna Prasad B S, Nischay M\",\"doi\":\"10.24003/emitter.v10i2.716\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency. NoC is a communication architecture used in the processor cores to transfer  data from source to destination through several nodes. Since NoC deals with on-chip interconnection for data transmission, it will be a good prey for data leakage and other security attacks. One such way of attacking is done by a third-party vendor introducing Hardware Trojans (HTs) into routers of NoC architecture. This can cause packets to traverse in wrong paths, leak/extract information and cause Denial-of-Service (DoS) degrading the system performance. In this paper, a novel HT detection and mitigation approach using obfuscation and key-based authentication technique is proposed. The proposed technique prevents any illegal transitions between routers thereby protecting data from malicious activities, such as packet misrouting and information leakage. The proposed technique is evaluated on a 4x4 NoC architecture under synthetic traffic pattern and benchmarks, the hardware model is synthesized in Cadence Tool with 90nm technology. The introduced Hardware Trojan affects 8% of packets passing through infected router. Experimental results demonstrate that the proposed technique prevents those 10-15% of packets infected from the HT effect. Our proposed work has negligible power and area overhead of 8.6% and  2% respectively.\",\"PeriodicalId\":40905,\"journal\":{\"name\":\"EMITTER-International Journal of Engineering Technology\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2022-12-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"EMITTER-International Journal of Engineering Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.24003/emitter.v10i2.716\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"EMITTER-International Journal of Engineering Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24003/emitter.v10i2.716","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 1

摘要

今天的多处理器片上系统(MPSoC)包含许多核心和集成电路。由于当前通信的要求,我们利用片上网络(NoC)来获得高吞吐量和低延迟。NoC是处理器核心中使用的一种通信体系结构,通过多个节点将数据从源传输到目标。由于NoC处理的是数据传输的片上互连,因此它将成为数据泄露和其他安全攻击的好猎物。一种这样的攻击方式是由第三方供应商将硬件木马(ht)引入NoC架构的路由器。这可能导致数据包在错误的路径上遍历,泄漏/提取信息,并导致拒绝服务(DoS),降低系统性能。本文提出了一种基于模糊和基于密钥的认证技术的新型高温检测和缓解方法。所提出的技术可以防止路由器之间的非法传输,从而保护数据免受恶意活动的影响,例如数据包路由错误和信息泄漏。在综合流量模式和基准测试下,在4x4 NoC架构上对该技术进行了评估,并在Cadence Tool中采用90nm技术合成了硬件模型。引入的硬件木马会影响通过受感染路由器的8%的数据包。实验结果表明,该技术可以有效防止10-15%的数据包感染HT效应。我们建议的工作功率和面积开销分别为8.6%和2%,可以忽略不计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency. NoC is a communication architecture used in the processor cores to transfer  data from source to destination through several nodes. Since NoC deals with on-chip interconnection for data transmission, it will be a good prey for data leakage and other security attacks. One such way of attacking is done by a third-party vendor introducing Hardware Trojans (HTs) into routers of NoC architecture. This can cause packets to traverse in wrong paths, leak/extract information and cause Denial-of-Service (DoS) degrading the system performance. In this paper, a novel HT detection and mitigation approach using obfuscation and key-based authentication technique is proposed. The proposed technique prevents any illegal transitions between routers thereby protecting data from malicious activities, such as packet misrouting and information leakage. The proposed technique is evaluated on a 4x4 NoC architecture under synthetic traffic pattern and benchmarks, the hardware model is synthesized in Cadence Tool with 90nm technology. The introduced Hardware Trojan affects 8% of packets passing through infected router. Experimental results demonstrate that the proposed technique prevents those 10-15% of packets infected from the HT effect. Our proposed work has negligible power and area overhead of 8.6% and  2% respectively.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
EMITTER-International Journal of Engineering Technology
EMITTER-International Journal of Engineering Technology ENGINEERING, ELECTRICAL & ELECTRONIC-
自引率
0.00%
发文量
7
审稿时长
12 weeks
期刊最新文献
Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques Estimation of Confidence in the Dialogue based on Eye Gaze and Head Movement Information Experimental Study of Hydroformed Al6061T4 Elliptical Tube Samples under Different Internal Pressures Numerical Study of a Wind Turbine Blade Modification Using 30° Angle Winglet on Clark Y Foil 3D Visualization for Lung Surface Images of Covid-19 Patients based on U-Net CNN Segmentation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1