2014
DOI: 10.1109/mm.2014.46
|View full text |Cite
|
Sign up to set email alerts
|

Networks on Chip with Provable Security Properties

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
29
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(29 citation statements)
references
References 22 publications
0
29
0
Order By: Relevance
“…They include temporal network partitioning, based on high [7] and bounded [8] priorities arbitration schemes. Furthermore, the work of [9] proposes random arbitration and adaptive routing as protection techniques.…”
Section: Related Workmentioning
confidence: 99%
“…They include temporal network partitioning, based on high [7] and bounded [8] priorities arbitration schemes. Furthermore, the work of [9] proposes random arbitration and adaptive routing as protection techniques.…”
Section: Related Workmentioning
confidence: 99%
“…In [3][4][5], hard Quality-of-Service mechanisms are integrated into a NoC in order to guarantee the attacker traffic performance under different data injection rates of the sensible process. Temporal network partitioning (TNP) is adopted in [3][4].…”
Section: Related Workmentioning
confidence: 99%
“…In [3][4][5], hard Quality-of-Service mechanisms are integrated into a NoC in order to guarantee the attacker traffic performance under different data injection rates of the sensible process. Temporal network partitioning (TNP) is adopted in [3][4]. In [3] two techniques are employed: i) high priority arbitration, which establishes the lower communication privileges to the sensible traffic; and ii) IEEE EMBEDDED SYSTEMS LETTERS bounded priority (reserved priority with static limits: RPSL), similar to the TNP but including virtual channels for sensible data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, a practical timing attack on NoCbased MPSoC has not been reported yet. The exploration of NoC channels as a leakage source was addressed by Yao et al [14], Wassel [15] and Sepúlveda et al [16]. The works of [14] [15] propose the integration of hard QoS mechanism to isolate the sensitive information.…”
Section: Introductionmentioning
confidence: 99%