Proceedings of the 6th IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis 2008
DOI: 10.1145/1450135.1450180
|View full text |Cite
|
Sign up to set email alerts
|

A security monitoring service for NoCs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0
2

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 64 publications
(46 citation statements)
references
References 11 publications
0
44
0
2
Order By: Relevance
“…However, during an attack, a significant percent of PAPs are expected to have a higher NLD. We clearly see this contrast in an attack scenario, where more than 60% of packets have an NLD greater than the chosen NLD (12). Hence, there is a clear separation between a no-attack and attack scenario that enables the identification of a trojan.…”
Section: Rlan Efficacymentioning
confidence: 89%
See 1 more Smart Citation
“…However, during an attack, a significant percent of PAPs are expected to have a higher NLD. We clearly see this contrast in an attack scenario, where more than 60% of packets have an NLD greater than the chosen NLD (12). Hence, there is a clear separation between a no-attack and attack scenario that enables the identification of a trojan.…”
Section: Rlan Efficacymentioning
confidence: 89%
“…Diguet et al's work on SNI can protect from denial of service (DoS) attack caused by replay, livelock, deadlock, and incorrect path. Fiorin et al propose the use of DoS probe as a part of the NoC monitoring architecture [12]. Parallel to these works in security, there have been numerous proposals to provide quality of service (QoS) guarantees in a NoC [9].…”
Section: Related Workmentioning
confidence: 99%
“…• If an on-chip security sensor detects suspected tampering [12], messages can be sent to all processor cores protecting their memory and processing in a timely fashion. • In the event of a voltage droop in a specific core, information about the droop can be quickly sent to other cores so residual effects can be monitored and addressed.…”
Section: B Sensor Data Broadcasting Applicationsmentioning
confidence: 99%
“…The concept and architectures are proven by gate-level implementation and gate-level signal traces. Fiorin et al [12] have detailed a security monitoring system for NoC based architectures. The proposed architecture is composed of probes and a Network Security Manager (NSM).…”
Section: Related Workmentioning
confidence: 99%