2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS) 2015
DOI: 10.1109/mwscas.2015.7282167
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting state obfuscation to detect hardware trojans in NoC network interfaces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
19
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(20 citation statements)
references
References 14 publications
1
19
0
Order By: Relevance
“…Round-robin arbitration is used in both 2D NoC and NOC-SIP. The NI for the 2D mesh NoC is OCP-IP compatible [24]. The hardware cost of our NOC-SIP is compared with two typical 4×4 mesh NoCs.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Round-robin arbitration is used in both 2D NoC and NOC-SIP. The NI for the 2D mesh NoC is OCP-IP compatible [24]. The hardware cost of our NOC-SIP is compared with two typical 4×4 mesh NoCs.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…The conclusion obtained from this analysis is valid for the entire network. As listed in Table 1, the proposed NOC-SIP with source routing (XY routing) consumes 82% (86%) less area than the 2D NoC in [24]. We added the typical 2D router design and the NI presented in [25] as another reference point.…”
Section: Area Delay and Power Comparisonmentioning
confidence: 99%
“…• Bus-level Trojansthis type of HT is connected with the network fabrics of buses (i.e., linkers [26], [27]) or embedded into the modules of the on-chip buses (such as routing nodes [19], [108], control units, and network interfaces [28]). They are mainly triggered by internal rare signals or by data flowing through the on-chip buses and can tamper with the integrity and reliability of interconnection fabrics and routers in the SoC designs (as shown in Fig.…”
Section: A Ht Definition Taxonomy and Protection 1) Ht Definition mentioning
confidence: 99%
“…Another study provided a proof-of-concept demonstration of the potential benefit of using logical implications for the detection of combinational hardware Trojans [20]. In [21], the authors concerned on the hardware Trojan detection in the network interfaces of networks-on-chip using the state obfuscation.…”
Section: Accepted Manuscriptmentioning
confidence: 99%