2018 25th IEEE International Conference on Electronics, Circuits and Systems (ICECS) 2018
DOI: 10.1109/icecs.2018.8617940
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Secure MPSoC Dynamic Operation through Protected Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…The object code integrity is usually achieved with message authentication codes (MAC). While spreading the application on MPSoC, each IP will verify the MAC individually [32]. SipHash-2-4 is one of the recommendations to avoid code injection attack [32].…”
Section: Secure Admission Of Applicationmentioning
confidence: 99%
See 1 more Smart Citation
“…The object code integrity is usually achieved with message authentication codes (MAC). While spreading the application on MPSoC, each IP will verify the MAC individually [32]. SipHash-2-4 is one of the recommendations to avoid code injection attack [32].…”
Section: Secure Admission Of Applicationmentioning
confidence: 99%
“…While spreading the application on MPSoC, each IP will verify the MAC individually [32]. SipHash-2-4 is one of the recommendations to avoid code injection attack [32]. The pre-stored MAC is compared with computed MAC-over the application memory block.…”
Section: Secure Admission Of Applicationmentioning
confidence: 99%
“…Azad et al [40] propose a firewall to guarantee the platform's integrity and confidentiality. The firewall is placed at the NI and has two tables: (i) initiator table, which checks if the source has permission to send messages, and (ii) target table, which verifies if the message is allowed to enter the target unit.…”
Section: (I) Firewallsmentioning
confidence: 99%
“…Multiprocessor-System-on-Chip (MPSoC) and related on-chip networking architectures for communicating System-on-Chip (SoC) elements have been extensively investigated in the past [1]; however, their security is seldom mentioned [2]. The accuracy and security of the hardware, especially the processors, need to be enhanced because they suffer from attacks, and hardware mending is difficult or even unfeasible [3].…”
Section: Introductionmentioning
confidence: 99%