2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2020
DOI: 10.1109/isvlsi49217.2020.000-1
|View full text |Cite
|
Sign up to set email alerts
|

Guard-NoC: A Protection Against Side-Channel Attacks for MPSoCs

Abstract: Multi-Processor System-on-Chips (MPSoCs) are popular computational platforms for a wide variety of applications due to their energy efficiency and flexibility. Like many other platforms they are vulnerable to Side Channel Attacks (SCAs). In particular, Logical SCAs (LSCAs) are very powerful as sensitive information can be retrieved by simply observing system properties that depend on the victim's software execution on the MPSoC. Unfortunately, many of the current protection mechanisms are either platform depen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 30 publications
(35 reference statements)
0
6
0
Order By: Relevance
“…We will also discuss virtual prototyping, which can detect simple side channels. [100], Napoli2018 [101], Reinbrecht [102], De2019 [103], Zhang2018 [104], Dao2020 [105], Van2020 [106], Sauvage2017 [107].…”
Section: Protection Against Side-channel Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…We will also discuss virtual prototyping, which can detect simple side channels. [100], Napoli2018 [101], Reinbrecht [102], De2019 [103], Zhang2018 [104], Dao2020 [105], Van2020 [106], Sauvage2017 [107].…”
Section: Protection Against Side-channel Attacksmentioning
confidence: 99%
“…Unfortunately, many current protection mechanisms are either platform-dependent or only effective against a few attacks. Reinbrecht [102] introduces Guard-NoC, which is a secure network-on-chip (NoC) architecture that can protect MPSoC from various Logical SCAs. The secure NoC uses three application-independent strategies to hide and isolate sensitive information by masking the execution time of the operation and employing dual communication strategy such as using packet and circuit switching at the same time.…”
Section: Timing Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…In [100], authors have proposed an obfuscation module to add random delay to packets generated inside the static zone to protect them against timing attack and probing. Consequently, malicious IPs are no longer able to monitor the computation time and/or cache hit/miss rate of the target application.…”
Section: ) Static Secure Zonesmentioning
confidence: 99%
“…Reinbrecht et al [58] present Guard-NoC, a platform pro-tected against Side-Channel Attacks, specifically Timing Attacks. The protection is based on the Obfuscation Module (Figure 13), placed between the Network Interface and the local IC input.…”
Section: (V) Obfuscationmentioning
confidence: 99%