首页> 外文期刊>Journal of Parallel and Distributed Computing >Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs
【24h】

Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs

机译:缓解针对安全NoC的基于硬件Trojan的拒绝服务攻击

获取原文
获取原文并翻译 | 示例

摘要

As Multiprocessor System-on-Chips (MPSoCs) continue to scale, security for Network-on-Chips (NoCs) is a growing concern as rogue agents threaten to infringe on the hardware's trust and maliciously implant Hardware Trojans (HTs) to undermine their reliability. The trustworthiness of MPSoCs will rely on our ability to detect Denial-of-Service (DoS) threats posed by the HTs and mitigate HTs in a compromised NoC to permit graceful network degradation. In this paper, we propose a new light-weight target-activated sequential payload (TASP) HT model that performs packet inspection and injects faults to create a new type of DoS attack. Faults injected are used to trigger a response from error correction code (ECC) schemes and cause repeated retransmission to starve network resources and create deadlocks capable of rendering single-application to full chip failures. To circumvent the threat of HTs, we propose a heuristic threat detection model to classify faults and discover HTs within compromised links. To prevent further disruption, we propose several switch-to-switch link obfuscation methods to avoid triggering of HTs in an effort to continue using links instead of rerouting packets with minimal overhead (1-3 cycles). To sustain data integrity over a compromised link, we propose an optimized implementation of algebraic manipulation detection (AMD) codes to detect any fault injection in targeted flits. Our proposed modifications complement existing fault detection and obfuscation methods and only add 2% in area overhead and 6% in excess power consumption in the NoC micro-architecture.
机译:随着多处理器片上系统(MPSoC)的不断扩展,片上网络(NoC)的安全性日益受到关注,因为流氓代理威胁要侵犯硬件的信任并恶意植入硬件特洛伊木马(HT)来破坏其可靠性。 。 MPSoC的可信赖性将取决于我们检测HT构成的拒绝服务(DoS)威胁并缓解受到威胁的NoC中的HT的能力,以实现正常的网络降级。在本文中,我们提出了一种新的轻型目标激活顺序有效载荷(TASP)HT模型,该模型执行数据包检查并注入故障以创建新型的DoS攻击。注入的故障用于触发来自纠错码(ECC)方案的响应,并引起重复的重新传输,从而使网络资源匮乏,并产生能够使单个应用程序呈现全芯片故障的死锁。为了规避HT的威胁,我们提出了一种启发式威胁检测模型,以对故障进行分类并在受损链路中发现HT。为了防止进一步的中断,我们提出了几种交换机到交换机的链路混淆方法,以避免触发HT,以继续使用链路,而不是以最小的开销(1-3个周期)重新路由数据包。为了在受到威胁的链路上保持数据完整性,我们提出了代数操作检测(AMD)代码的优化实现,以检测目标目标芯片中的任何故障注入。我们提出的修改是对现有故障检测和混淆方法的补充,在NoC微体系结构中仅增加了2%的面积开销和6%的超额功耗。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号