scispace - formally typeset
Open AccessJournal ArticleDOI

Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security- Driven Task Scheduling

TLDR
This work proposes to incorporate trojan toleration into MPSoC platforms by revising the task scheduling step of theMPSoC design process, and imposes a set of security-driven diversity constraints into the scheduling process, enabling the system to detect the presence of malicious modifications or to mute their effects during application execution.
Abstract
Multiprocessor system-on-chip (MPSoC) platforms face some of the most demanding security concerns, as they process, store, and communicate sensitive information using third-party intellectual property (3PIP) cores. The complexity of MPSoC makes it expensive and time consuming to fully analyze and test during the design stage. This has given rise to the trend of outsourcing design and fabrication of 3PIP components, that may not be trustworthy. To protect MPSoCs against malicious modifications, we impose a set of security-driven diversity constraints into the task scheduling step of the MPSoC design process, enabling the system to detect the presence of malicious modifications or to mute their effects during application execution. We pose the security-constrained MPSoC task scheduling as a multidimensional optimization problem, and propose a set of heuristics to ensure that the introduced security constraints can be fulfilled with a minimum impact on the other design goals such as performance and hardware. Experimental results show that without any extra cores, security constraints can be fulfilled within four vendors and 81% overhead in schedule length.

read more

Citations
More filters
Journal ArticleDOI

Hardware Trojans: Lessons Learned after One Decade of Research

TL;DR: This article examines the research on hardware Trojans from the last decade and attempts to capture the lessons learned and identifies the most critical lessons for those new to the field and suggests a roadmap for future hardware Trojan research.
Journal ArticleDOI

Differential Privacy-Based Blockchain for Industrial Internet-of-Things

TL;DR: The proposed model sufficiently exploits advantages of edge computing and blockchain to establish a privacy-preserving mechanism while considering other constraints, such as energy cost, and improves privacy protections without lowering down the performance in an energy-efficient manner.
Proceedings ArticleDOI

SVM-based real-time hardware Trojan detection for many-core platform

TL;DR: A run-time Trojan detection architecture for a custom many-core based on Machine Learning technique that exploits Support Vector Machine (SVM) supervised machine learning algorithms to target different communication attacks triggered by Hardware Trojans.
Journal ArticleDOI

Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach

TL;DR: This paper identifies design constraints for Trojan detection to achieving detection, collusion prevention, and isolating the Trojan-infected 3PIP, and incorporates them during high-level synthesis.
Proceedings ArticleDOI

Runtime Detection of a Bandwidth Denial Attack from a Rogue Network-on-Chip

TL;DR: It is illustrated that a malicious NoC can disrupt the availability of on-chip resources, thereby causing large performance bottlenecks for the software running on the MPSoC platform.
References
More filters
Journal ArticleDOI

Dynamic critical-path scheduling: an effective technique for allocating task graphs to multiprocessors

TL;DR: A static scheduling algorithm for allocating task graphs to fully connected multiprocessors which has admissible time complexity, is economical in terms of the number of processors used and is suitable for a wide range of graph structures.
Journal ArticleDOI

Classes of recursively enumerable sets and their decision problems

TL;DR: This paper considers classes whose elements are re-cursively enumerable sets of non-negative integers whose properties are complete recursive enumerability and complete recursiveness.
Proceedings ArticleDOI

Dynamic matching and scheduling of a class of independent tasks onto heterogeneous computing systems

TL;DR: Three new heuristics, one for batch and two for on-line, are introduced as part of this research, revealing that the choice of mapping heuristic depends on parameters such as: the structure of the heterogeneity among tasks and machines, the optimization requirements, and the arrival rate of the tasks.
Journal ArticleDOI

Parallel Computer Architecture: A Hardware/Software Approach

TL;DR: The core section introduces a uniform model of one-way communication protocols and shows that the corresponding uniform one- way communication complexity is strongly related to the size of deterministic finite automata.
Journal ArticleDOI

Trustworthy Hardware: Identifying and Classifying Hardware Trojans

TL;DR: A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
Related Papers (5)