2021
DOI: 10.1145/3450964
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Network-on-Chip Security Attacks and Countermeasures

Abstract: With the advances of chip manufacturing technologies, computer architects have been able to integrate an increasing number of processors and other heterogeneous components on the same chip. Network-on-Chip (NoC) is widely employed by multicore System-on-Chip (SoC) architectures to cater to their communication requirements. NoC has received significant attention from both attackers and defenders. The increased usage of NoC and its distributed nature across the chip has made it a focal point of potential securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(16 citation statements)
references
References 77 publications
0
10
0
Order By: Relevance
“…Details on optical interconnection technologies and underline basic physics can be found in [15]. [22] provides a extensive survey on network on chip attack and countermeasures which focus only on security of electrical NoCs. A recent survey [68] explores security on wired, wireless as well as 3-D NoCs.…”
Section: Major Differences With Existing Surveysmentioning
confidence: 99%
“…Details on optical interconnection technologies and underline basic physics can be found in [15]. [22] provides a extensive survey on network on chip attack and countermeasures which focus only on security of electrical NoCs. A recent survey [68] explores security on wired, wireless as well as 3-D NoCs.…”
Section: Major Differences With Existing Surveysmentioning
confidence: 99%
“…Figure 12: Example of a fault-tolerant routing scheme. 8 Computational Intelligence and Neuroscience…”
Section: Fault-tolerant Routingmentioning
confidence: 99%
“…As shown in Figure 15, when the injection rate is less than 0.1, the throughput rates of the normal, GA-Router, GA-Fault1, GA-Fault2, and GA-Fault3 modes are basically the same. During the operation of the simulation model, all kinds of data were recorded according to formula (8). After data processing was completed, the results were plotted in Figure 15.…”
Section: Parameter Simulation and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Network-on-Chip (NoC) facilitates communication between the IPs and has access to all the components of an SoC. Hence, it is more vulnerable to attacks, as a malicious IP can simply eavesdrop NoC packets to extract information without the need of hacking into individual IPs [6]. This work considers that the proposed HT is mounted on the Network Interface (NI) of the malicious IP, which connects it to the NoC IP (refer Figure 3).…”
Section: A Threat Modelmentioning
confidence: 99%