Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security- Driven Task Scheduling
TLDR
This work proposes to incorporate trojan toleration into MPSoC platforms by revising the task scheduling step of theMPSoC design process, and imposes a set of security-driven diversity constraints into the scheduling process, enabling the system to detect the presence of malicious modifications or to mute their effects during application execution.Abstract:
Multiprocessor system-on-chip (MPSoC) platforms face some of the most demanding security concerns, as they process, store, and communicate sensitive information using third-party intellectual property (3PIP) cores. The complexity of MPSoC makes it expensive and time consuming to fully analyze and test during the design stage. This has given rise to the trend of outsourcing design and fabrication of 3PIP components, that may not be trustworthy. To protect MPSoCs against malicious modifications, we impose a set of security-driven diversity constraints into the task scheduling step of the MPSoC design process, enabling the system to detect the presence of malicious modifications or to mute their effects during application execution. We pose the security-constrained MPSoC task scheduling as a multidimensional optimization problem, and propose a set of heuristics to ensure that the introduced security constraints can be fulfilled with a minimum impact on the other design goals such as performance and hardware. Experimental results show that without any extra cores, security constraints can be fulfilled within four vendors and 81% overhead in schedule length.read more
Citations
More filters
Journal ArticleDOI
Hardware Trojans: Lessons Learned after One Decade of Research
TL;DR: This article examines the research on hardware Trojans from the last decade and attempts to capture the lessons learned and identifies the most critical lessons for those new to the field and suggests a roadmap for future hardware Trojan research.
Journal ArticleDOI
Differential Privacy-Based Blockchain for Industrial Internet-of-Things
TL;DR: The proposed model sufficiently exploits advantages of edge computing and blockchain to establish a privacy-preserving mechanism while considering other constraints, such as energy cost, and improves privacy protections without lowering down the performance in an energy-efficient manner.
Proceedings ArticleDOI
SVM-based real-time hardware Trojan detection for many-core platform
TL;DR: A run-time Trojan detection architecture for a custom many-core based on Machine Learning technique that exploits Support Vector Machine (SVM) supervised machine learning algorithms to target different communication attacks triggered by Hardware Trojans.
Journal ArticleDOI
Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach
TL;DR: This paper identifies design constraints for Trojan detection to achieving detection, collusion prevention, and isolating the Trojan-infected 3PIP, and incorporates them during high-level synthesis.
Proceedings ArticleDOI
Runtime Detection of a Bandwidth Denial Attack from a Rogue Network-on-Chip
TL;DR: It is illustrated that a malicious NoC can disrupt the availability of on-chip resources, thereby causing large performance bottlenecks for the software running on the MPSoC platform.
References
More filters
Proceedings ArticleDOI
Architectures for online error detection and recovery in multicore processors
Dimitris Gizopoulos,Mihalis Psarakis,Sarita V. Adve,Pradeep Ramachandran,Siva Kumar Sastry Hari,Daniel J. Sorin,Albert Meixner,Arijit Biswas,Xavier Vera +8 more
TL;DR: This paper focuses on dependable multicore processor architectures that integrate solutions for online error detection, diagnosis, recovery, and repair during field operation and discusses taxonomy of representative approaches and presents a qualitative comparison based on hardware cost, performance overhead, types of faults detected, and detection latency.
Journal ArticleDOI
Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution
Swarup Bhunia,Miron Abramovici,Dakshi Agrawal,Paul Bradley,Michael S. Hsiao,Jim Plusquellic,Mohammad Tehranipoor +6 more
TL;DR: An overview of hardware Trojans and countermeasures is provided that act as spies or terrorists in the microelectronic industry.
Journal ArticleDOI
A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection
TL;DR: A unified formal framework for integrated circuits (ICs) Trojan detection that can simultaneously employ multiple noninvasive side-channel measurement types (modalities) and a new submodular formulation of the problem objective function is devised.
Journal ArticleDOI
Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges
Mohammad Tehranipoor,Hassan Salmani,Xuehui Zhang,Xiaoxiao Wang,Ramesh Karri,Jeyavijayan Rajendran,Kurt Rosenfeld +6 more
TL;DR: Globalization of the semiconductor industry and associated supply chains have made integrated circuits increasingly vulnerable to Trojans and researchers must expand efforts to verify trust in intellectual property cores and ICs.
Proceedings ArticleDOI
Tamper Evident Microprocessors
Adam Waksman,Simha Sethumadhavan +1 more
TL;DR: It is shown that it is possible to protect against malicious logic embedded in microprocessor hardware by employing practical, lightweight attack detectors within a microprocessor, and combining TrustNet and DataWatch with prior work on fault detection has the potential to provide complete coverage against a large class of microprocessor attacks.