2019
DOI: 10.1109/access.2019.2929274
|View full text |Cite
|
Sign up to set email alerts
|

A Benchmark Suite of Hardware Trojans for On-Chip Networks

Abstract: As recently studied, network-on-chip (NoC) suffers growing threats from hardware trojans (HTs), leading to performance degradation or information leakage when it provides communication service in many/multi-core systems. Therefore, defense techniques against NoC HTs experience rapid development in recent years. However, to the best of our knowledge, there are few standard benchmarks developed for the defense techniques evaluation. To address this issue, in this paper, we design a suite of benchmarks which invo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…These extensions may include leveraging FIB to create opens and shorts within circuits, particularly with regard to security-critical nets involved in on-chip tamper detection and response mechanisms. Also, we will target more emerging device models such as large on-chip communication infrastructure [34] and 3D ICs [35].…”
Section: Discussionmentioning
confidence: 99%
“…These extensions may include leveraging FIB to create opens and shorts within circuits, particularly with regard to security-critical nets involved in on-chip tamper detection and response mechanisms. Also, we will target more emerging device models such as large on-chip communication infrastructure [34] and 3D ICs [35].…”
Section: Discussionmentioning
confidence: 99%
“…For instance, chiplet design/fabrication or/and interposer fabrication team may have intentions to incorporate hardware Trojans to intercept sensitive communication among chiplets [53], resulting in unauthorized physical disruptions to the global on-chip infrastructure, such as the power distribution network (PDN), leading to the induction of faults in other chiplets [54]. It also could be substantial performance degradation that may result from injecting a large volume of fake traffic into the on-chip communication interface [55]. Note that while the current HI solutions may primarily be implemented internally by prominent semiconductor companies such as AMD and Intel [56], more malicious implants will be witnessed over time due to the ever-increasing emergence of third parties.…”
Section: B Case C2: Malicious Hardware Modificationmentioning
confidence: 99%
“…A trojan is a unique circuit that performs specific malicious activity [21]. Trojan considered in our proposed work will change the functionality of the circuit.…”
Section: A Design Of Trojan Threat Modelmentioning
confidence: 99%