Biswas, Arnab Kumar and Nandy, SK and Narayan, Ranjani (2015) Network-on-Chip Router attacks and their prevention in MP-SoCs with multiple Trusted Execution Environments. In: IEEE International Conference on Electronics Computing and Communication Technologies (CONECCT), JUL 10-11, 2015, Bangalore, INDIA.
PDF
IEEE_CONECCT_1_2015.pdf - Published Version Restricted to Registered users only Download (431kB) | Request a copy |
Abstract
NoC based high performance MP-SoCs can have multiple secure regions or Trusted Execution Environments (TEEs). These TEEs can be separated by non-secure regions or Rich Execution Environments (REEs) in the same MP-SoC. All communications between two TEEs need to cross the in-between REEs. Without any security mechanisms, these traffic flows can face router attacks in REEs. Both routing table and routing logic based routers are vulnerable to such attacks. In this paper, we address attacks on routing tables. We propose two countermeasures - Run-time protector and Restart-time protector. In addition to detection and prevention, proposed protectors can locate a malicious router also. Synthesis results show that, the area of a Run-time protector and a Restart-time protector is only 6.6% and 2% of a conventional router area respectively.
Item Type: | Conference Proceedings |
---|---|
Additional Information: | Copy right for this article belongs to the IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA |
Department/Centre: | Division of Electrical Sciences > Electronic Systems Engineering (Formerly Centre for Electronic Design & Technology) Division of Interdisciplinary Sciences > Supercomputer Education & Research Centre |
Date Deposited: | 22 Oct 2016 09:05 |
Last Modified: | 22 Oct 2016 09:05 |
URI: | http://eprints.iisc.ac.in/id/eprint/54971 |
Actions (login required)
View Item |