Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores

The modularization and manufacture of many-cores system-on-chip that involve several vendors open up a vulnerability: the inclusion of Hardware Trojans (HT). In addition to that, the reduced feature size of transistors may accelerate aging effects, leading to faults. The literature presents techniqu...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Rafael Follmann Faccenda, Luciano L. Caimi, Fernando Gehm Moraes
Formato: article
Lenguaje:EN
Publicado: IEEE 2021
Materias:
Acceso en línea:https://doaj.org/article/85f3cb83e25c4210b0785da5289a54a8
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:85f3cb83e25c4210b0785da5289a54a8
record_format dspace
spelling oai:doaj.org-article:85f3cb83e25c4210b0785da5289a54a82021-11-20T00:02:25ZDetection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores2169-353610.1109/ACCESS.2021.3127468https://doaj.org/article/85f3cb83e25c4210b0785da5289a54a82021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9612218/https://doaj.org/toc/2169-3536The modularization and manufacture of many-cores system-on-chip that involve several vendors open up a vulnerability: the inclusion of Hardware Trojans (HT). In addition to that, the reduced feature size of transistors may accelerate aging effects, leading to faults. The literature presents techniques to tackle security and fault-tolerance, such as cryptography, authentication codes, error correction codes, creation at runtime of flow profiles to detect anomalous behavior. However, at the communication level (i.e., NoC), there is a gap in generic methods to detect attacks or faults. As detailed in the state-of-the-art session, approaches targeting the NoC protection against attacks add additional hardware in the NoC itself, which is prone to security attacks or faults. This work decouples the detection of attacks or faults by using data and control NoCs. The adoption of a control NoC enables the proposal of the Communication Session Protocol to monitor message exchange, detect abnormal behavior, and recover the communication from an eventual failure or attack. The execution time overhead varies according to the application communication model, from 3.5% to 33%. Such overhead is acceptable because once detected an abnormal communication behavior, the protocol changes the path between communicating task pairs and resumes the application execution.Rafael Follmann FaccendaLuciano L. CaimiFernando Gehm MoraesIEEEarticleSecurity countermeasuresfault-tolerancehardware trojansNoC-based many coresElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 153142-153152 (2021)
institution DOAJ
collection DOAJ
language EN
topic Security countermeasures
fault-tolerance
hardware trojans
NoC-based many cores
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
spellingShingle Security countermeasures
fault-tolerance
hardware trojans
NoC-based many cores
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
Rafael Follmann Faccenda
Luciano L. Caimi
Fernando Gehm Moraes
Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores
description The modularization and manufacture of many-cores system-on-chip that involve several vendors open up a vulnerability: the inclusion of Hardware Trojans (HT). In addition to that, the reduced feature size of transistors may accelerate aging effects, leading to faults. The literature presents techniques to tackle security and fault-tolerance, such as cryptography, authentication codes, error correction codes, creation at runtime of flow profiles to detect anomalous behavior. However, at the communication level (i.e., NoC), there is a gap in generic methods to detect attacks or faults. As detailed in the state-of-the-art session, approaches targeting the NoC protection against attacks add additional hardware in the NoC itself, which is prone to security attacks or faults. This work decouples the detection of attacks or faults by using data and control NoCs. The adoption of a control NoC enables the proposal of the Communication Session Protocol to monitor message exchange, detect abnormal behavior, and recover the communication from an eventual failure or attack. The execution time overhead varies according to the application communication model, from 3.5% to 33%. Such overhead is acceptable because once detected an abnormal communication behavior, the protocol changes the path between communicating task pairs and resumes the application execution.
format article
author Rafael Follmann Faccenda
Luciano L. Caimi
Fernando Gehm Moraes
author_facet Rafael Follmann Faccenda
Luciano L. Caimi
Fernando Gehm Moraes
author_sort Rafael Follmann Faccenda
title Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores
title_short Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores
title_full Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores
title_fullStr Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores
title_full_unstemmed Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores
title_sort detection and countermeasures of security attacks and faults on noc-based many-cores
publisher IEEE
publishDate 2021
url https://doaj.org/article/85f3cb83e25c4210b0785da5289a54a8
work_keys_str_mv AT rafaelfollmannfaccenda detectionandcountermeasuresofsecurityattacksandfaultsonnocbasedmanycores
AT lucianolcaimi detectionandcountermeasuresofsecurityattacksandfaultsonnocbasedmanycores
AT fernandogehmmoraes detectionandcountermeasuresofsecurityattacksandfaultsonnocbasedmanycores
_version_ 1718419845462097920