2020 IEEE International Symposium on Circuits and Systems (ISCAS) 2020
DOI: 10.1109/iscas45731.2020.9180578
|View full text |Cite
|
Sign up to set email alerts
|

Open-Source NoC-Based Many-Core for Evaluating Hardware Trojan Detection Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…The authors in [18], implement a detection algorithm that detects changes in traffic communication to identify hostile IC's in the NOC. [19] has the authors make and subvert three types of trojan attacks. Packet Duplication, application blocking, and misrouting.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [18], implement a detection algorithm that detects changes in traffic communication to identify hostile IC's in the NOC. [19] has the authors make and subvert three types of trojan attacks. Packet Duplication, application blocking, and misrouting.…”
Section: Related Workmentioning
confidence: 99%
“…The goal of using this peripheral is to inject controlled traffic into the system to emulate attacks. The second mechanism is an HT circuit (based on [29]) connected to routers. The HT trigger may be a malicious application or a given condition (e.g., time-triggered HT) that can duplicate, misroute, or block flows.…”
Section: Security Analysis and Costsmentioning
confidence: 99%
“…Each normal packet generated by the transmitter in the network is routed through a series of intermediate nodes before reaching the receiver. However, some of these intermediate nodes may be embedded with hardware Trojans (HTs), which can keep a local copy of any packet [14], or use hardwaresupported debugging, such as the trace buffer [9], to export traffic traces to an unintended external analyzer. Either way there is a great danger of information leakage.…”
Section: A Threat Modelmentioning
confidence: 99%
“…Unfortunately, a manycore chip's network-on-chip (NoC) is perceived to be one of the most vulnerable spots in the security chain [25]. To reduce the time to market, a chip's NoC is often adopted from a third party vendor and there has been a great concern that it might have been compromised by hardware Trojans (HTs) [14], [49]. Unfortunately, completely removing all these hardware Trojans, particularly those conditionally triggered and switched on for a short duration of time, cannot be guaranteed at offline circuit testing stage.…”
Section: Introductionmentioning
confidence: 99%