Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security- Driven Task Scheduling
TLDR
This work proposes to incorporate trojan toleration into MPSoC platforms by revising the task scheduling step of theMPSoC design process, and imposes a set of security-driven diversity constraints into the scheduling process, enabling the system to detect the presence of malicious modifications or to mute their effects during application execution.Abstract:
Multiprocessor system-on-chip (MPSoC) platforms face some of the most demanding security concerns, as they process, store, and communicate sensitive information using third-party intellectual property (3PIP) cores. The complexity of MPSoC makes it expensive and time consuming to fully analyze and test during the design stage. This has given rise to the trend of outsourcing design and fabrication of 3PIP components, that may not be trustworthy. To protect MPSoCs against malicious modifications, we impose a set of security-driven diversity constraints into the task scheduling step of the MPSoC design process, enabling the system to detect the presence of malicious modifications or to mute their effects during application execution. We pose the security-constrained MPSoC task scheduling as a multidimensional optimization problem, and propose a set of heuristics to ensure that the introduced security constraints can be fulfilled with a minimum impact on the other design goals such as performance and hardware. Experimental results show that without any extra cores, security constraints can be fulfilled within four vendors and 81% overhead in schedule length.read more
Citations
More filters
Journal ArticleDOI
Hardware Trojans: Lessons Learned after One Decade of Research
TL;DR: This article examines the research on hardware Trojans from the last decade and attempts to capture the lessons learned and identifies the most critical lessons for those new to the field and suggests a roadmap for future hardware Trojan research.
Journal ArticleDOI
Differential Privacy-Based Blockchain for Industrial Internet-of-Things
TL;DR: The proposed model sufficiently exploits advantages of edge computing and blockchain to establish a privacy-preserving mechanism while considering other constraints, such as energy cost, and improves privacy protections without lowering down the performance in an energy-efficient manner.
Proceedings ArticleDOI
SVM-based real-time hardware Trojan detection for many-core platform
TL;DR: A run-time Trojan detection architecture for a custom many-core based on Machine Learning technique that exploits Support Vector Machine (SVM) supervised machine learning algorithms to target different communication attacks triggered by Hardware Trojans.
Journal ArticleDOI
Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach
TL;DR: This paper identifies design constraints for Trojan detection to achieving detection, collusion prevention, and isolating the Trojan-infected 3PIP, and incorporates them during high-level synthesis.
Proceedings ArticleDOI
Runtime Detection of a Bandwidth Denial Attack from a Rogue Network-on-Chip
TL;DR: It is illustrated that a malicious NoC can disrupt the availability of on-chip resources, thereby causing large performance bottlenecks for the software running on the MPSoC platform.
References
More filters
Journal ArticleDOI
Dynamic critical-path scheduling: an effective technique for allocating task graphs to multiprocessors
Yu-Kwong Kwok,Ishfaq Ahmad +1 more
TL;DR: A static scheduling algorithm for allocating task graphs to fully connected multiprocessors which has admissible time complexity, is economical in terms of the number of processors used and is suitable for a wide range of graph structures.
Journal ArticleDOI
Classes of recursively enumerable sets and their decision problems
TL;DR: This paper considers classes whose elements are re-cursively enumerable sets of non-negative integers whose properties are complete recursive enumerability and complete recursiveness.
Proceedings ArticleDOI
Dynamic matching and scheduling of a class of independent tasks onto heterogeneous computing systems
TL;DR: Three new heuristics, one for batch and two for on-line, are introduced as part of this research, revealing that the choice of mapping heuristic depends on parameters such as: the structure of the heterogeneity among tasks and machines, the optimization requirements, and the arrival rate of the tasks.
Journal ArticleDOI
Parallel Computer Architecture: A Hardware/Software Approach
TL;DR: The core section introduces a uniform model of one-way communication protocols and shows that the corresponding uniform one- way communication complexity is strongly related to the size of deterministic finite automata.
Journal ArticleDOI
Trustworthy Hardware: Identifying and Classifying Hardware Trojans
TL;DR: A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.