2023
DOI: 10.1109/tcad.2022.3179307
|View full text |Cite
|
Sign up to set email alerts
|

SeVNoC: Security Validation of System-on-Chip Designs With NoC Fabrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 40 publications
0
2
0
Order By: Relevance
“…They also implement a source-destination path randomization to further improve security. The authors in [18], implement a detection algorithm that detects changes in traffic communication to identify hostile IC's in the NOC. [19] has the authors make and subvert three types of trojan attacks.…”
Section: Related Workmentioning
confidence: 99%
“…They also implement a source-destination path randomization to further improve security. The authors in [18], implement a detection algorithm that detects changes in traffic communication to identify hostile IC's in the NOC. [19] has the authors make and subvert three types of trojan attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Meng et al [14] propose a framework for systematically detecting security violations in SoC designs resulting from vulnerabilities in NoC communication. The threat model includes message misdirection, message mutation, delivery prevention, and network congestion.…”
Section: Related Workmentioning
confidence: 99%
“…Work [20] proposes a security property validation method focusing on the communication fabrics of an SoC. It builds a CFG for each IP in the SoC and efficiently explores connections between various CFGs for any given security property.…”
Section: Related Workmentioning
confidence: 99%