2017 International Conference on Advanced Systems and Electric Technologies (IC_ASET) 2017
DOI: 10.1109/aset.2017.7983658
|View full text |Cite
|
Sign up to set email alerts
|

Toward on hardware firewalling of networks-on-chip based systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 9 publications
1
7
0
Order By: Relevance
“…When the distributed firewall is adopted, bandwidth is better utilized because packets will be rejected at the initiators before reaching the target NI. The firewalls could also be placed between the routers [94]. Security wrappers have been employed instead of firewalls in secure zones.…”
Section: E Access Authorizationmentioning
confidence: 99%
See 2 more Smart Citations
“…When the distributed firewall is adopted, bandwidth is better utilized because packets will be rejected at the initiators before reaching the target NI. The firewalls could also be placed between the routers [94]. Security wrappers have been employed instead of firewalls in secure zones.…”
Section: E Access Authorizationmentioning
confidence: 99%
“…Achballah et al [94] proposed a firewall that is placed between the NoC routers and separates the secured and nonsecured zones on NoC. The firewall serves two purposes.…”
Section: [93]-mentioning
confidence: 99%
See 1 more Smart Citation
“…The concept of DoS in the NoC context was introduced in [7]. Subsequently, approaches with different mitigation strategies for these kinds of attacks have been proposed [7][8][9][10][11][12][13][14][15][16][17][18]. Such approaches can be categorized in two main classes: DoS Avoidance and DoS detection and recovery.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Although such a firewall does not allow the DoS attack to be effective, it was designed to protect the destination PE (i.e., the on-chip memory), thus it does not detect the source of the attach, nor does it kill the attack-related traffic congesting the network. In [18], Achballah et al target computation of occupation time of the physical links in number of clock cycles. The occupation time of the physical link is compared to an expected value.…”
Section: Dos Attack Detection and Recoverymentioning
confidence: 99%