Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores
The modularization and manufacture of many-cores system-on-chip that involve several vendors open up a vulnerability: the inclusion of Hardware Trojans (HT). In addition to that, the reduced feature size of transistors may accelerate aging effects, leading to faults. The literature presents techniqu...
Guardado en:
Autores principales: | , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
IEEE
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/85f3cb83e25c4210b0785da5289a54a8 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:85f3cb83e25c4210b0785da5289a54a8 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:85f3cb83e25c4210b0785da5289a54a82021-11-20T00:02:25ZDetection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores2169-353610.1109/ACCESS.2021.3127468https://doaj.org/article/85f3cb83e25c4210b0785da5289a54a82021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9612218/https://doaj.org/toc/2169-3536The modularization and manufacture of many-cores system-on-chip that involve several vendors open up a vulnerability: the inclusion of Hardware Trojans (HT). In addition to that, the reduced feature size of transistors may accelerate aging effects, leading to faults. The literature presents techniques to tackle security and fault-tolerance, such as cryptography, authentication codes, error correction codes, creation at runtime of flow profiles to detect anomalous behavior. However, at the communication level (i.e., NoC), there is a gap in generic methods to detect attacks or faults. As detailed in the state-of-the-art session, approaches targeting the NoC protection against attacks add additional hardware in the NoC itself, which is prone to security attacks or faults. This work decouples the detection of attacks or faults by using data and control NoCs. The adoption of a control NoC enables the proposal of the Communication Session Protocol to monitor message exchange, detect abnormal behavior, and recover the communication from an eventual failure or attack. The execution time overhead varies according to the application communication model, from 3.5% to 33%. Such overhead is acceptable because once detected an abnormal communication behavior, the protocol changes the path between communicating task pairs and resumes the application execution.Rafael Follmann FaccendaLuciano L. CaimiFernando Gehm MoraesIEEEarticleSecurity countermeasuresfault-tolerancehardware trojansNoC-based many coresElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 153142-153152 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Security countermeasures fault-tolerance hardware trojans NoC-based many cores Electrical engineering. Electronics. Nuclear engineering TK1-9971 |
spellingShingle |
Security countermeasures fault-tolerance hardware trojans NoC-based many cores Electrical engineering. Electronics. Nuclear engineering TK1-9971 Rafael Follmann Faccenda Luciano L. Caimi Fernando Gehm Moraes Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores |
description |
The modularization and manufacture of many-cores system-on-chip that involve several vendors open up a vulnerability: the inclusion of Hardware Trojans (HT). In addition to that, the reduced feature size of transistors may accelerate aging effects, leading to faults. The literature presents techniques to tackle security and fault-tolerance, such as cryptography, authentication codes, error correction codes, creation at runtime of flow profiles to detect anomalous behavior. However, at the communication level (i.e., NoC), there is a gap in generic methods to detect attacks or faults. As detailed in the state-of-the-art session, approaches targeting the NoC protection against attacks add additional hardware in the NoC itself, which is prone to security attacks or faults. This work decouples the detection of attacks or faults by using data and control NoCs. The adoption of a control NoC enables the proposal of the Communication Session Protocol to monitor message exchange, detect abnormal behavior, and recover the communication from an eventual failure or attack. The execution time overhead varies according to the application communication model, from 3.5% to 33%. Such overhead is acceptable because once detected an abnormal communication behavior, the protocol changes the path between communicating task pairs and resumes the application execution. |
format |
article |
author |
Rafael Follmann Faccenda Luciano L. Caimi Fernando Gehm Moraes |
author_facet |
Rafael Follmann Faccenda Luciano L. Caimi Fernando Gehm Moraes |
author_sort |
Rafael Follmann Faccenda |
title |
Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores |
title_short |
Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores |
title_full |
Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores |
title_fullStr |
Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores |
title_full_unstemmed |
Detection and Countermeasures of Security Attacks and Faults on NoC-Based Many-Cores |
title_sort |
detection and countermeasures of security attacks and faults on noc-based many-cores |
publisher |
IEEE |
publishDate |
2021 |
url |
https://doaj.org/article/85f3cb83e25c4210b0785da5289a54a8 |
work_keys_str_mv |
AT rafaelfollmannfaccenda detectionandcountermeasuresofsecurityattacksandfaultsonnocbasedmanycores AT lucianolcaimi detectionandcountermeasuresofsecurityattacksandfaultsonnocbasedmanycores AT fernandogehmmoraes detectionandcountermeasuresofsecurityattacksandfaultsonnocbasedmanycores |
_version_ |
1718419845462097920 |