IEEE Workshop on Signal Processing Systems Design and Implementation, 2005.
DOI: 10.1109/sips.2005.1579858
|View full text |Cite
|
Sign up to set email alerts
|

From NoC security analysis to design solutions

Abstract: This paper addresses a new kind of security vulnerable spots introduced by Network-on-chip (NoC) use in System-on-Chip (SoC) design. This study is based on the experience of a CAD framework for NoC design and proposes a classification of weaknesses with regard to usual routing and interface techniques. Finally design strategies are proposed and a new path routing technique (SCP) is introduced with the aim to enforce security.I.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
35
0

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(35 citation statements)
references
References 10 publications
0
35
0
Order By: Relevance
“…In [11] and [13], security problems that may affect a NoC-based system are outlined, while providing guidelines to enhance protection from external attackers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [11] and [13], security problems that may affect a NoC-based system are outlined, while providing guidelines to enhance protection from external attackers.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, there is an increased need of security-aware design solutions, in particular in the design of reconfigurable SoCs. However, even if the research on NoC related topics has been an emerging area of interest, security issues in this field have been often shadowed by other topics and not been explored to the same extent, being only recently addressed by the research community [13,11].…”
Section: Introductionmentioning
confidence: 99%
“…Security integration at the NoC level was addressed in the works of [8,9]. They take advantage of the NoC wide system visibility and critical role in enabling system operation, exploiting the NoC to detect and prevent attacks.…”
Section: Previous Workmentioning
confidence: 99%
“…New keys can be downloaded and stored in the key-keeper core by using encryption techniques. The papers [8][9][10] integrate a table at the network interface containing the access control rules of each IP. They specify how a component of the NoC can access the protected device.…”
Section: Previous Workmentioning
confidence: 99%
“…In the domain of NoC, ARTERIS [3] proposes the introduction of Firewall relying on fixed communications schemes and software security based on a secure boot configuration. In [12] we present an overview of NoC security issues. Gebotys, in [6], extends classical key exchange protocols for IP identification within NoC.…”
Section: Relative Workmentioning
confidence: 99%