scispace - formally typeset
Open AccessJournal ArticleDOI

Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security- Driven Task Scheduling

TLDR
This work proposes to incorporate trojan toleration into MPSoC platforms by revising the task scheduling step of theMPSoC design process, and imposes a set of security-driven diversity constraints into the scheduling process, enabling the system to detect the presence of malicious modifications or to mute their effects during application execution.
Abstract
Multiprocessor system-on-chip (MPSoC) platforms face some of the most demanding security concerns, as they process, store, and communicate sensitive information using third-party intellectual property (3PIP) cores. The complexity of MPSoC makes it expensive and time consuming to fully analyze and test during the design stage. This has given rise to the trend of outsourcing design and fabrication of 3PIP components, that may not be trustworthy. To protect MPSoCs against malicious modifications, we impose a set of security-driven diversity constraints into the task scheduling step of the MPSoC design process, enabling the system to detect the presence of malicious modifications or to mute their effects during application execution. We pose the security-constrained MPSoC task scheduling as a multidimensional optimization problem, and propose a set of heuristics to ensure that the introduced security constraints can be fulfilled with a minimum impact on the other design goals such as performance and hardware. Experimental results show that without any extra cores, security constraints can be fulfilled within four vendors and 81% overhead in schedule length.

read more

Citations
More filters
Journal ArticleDOI

Hardware Trojans: Lessons Learned after One Decade of Research

TL;DR: This article examines the research on hardware Trojans from the last decade and attempts to capture the lessons learned and identifies the most critical lessons for those new to the field and suggests a roadmap for future hardware Trojan research.
Journal ArticleDOI

Differential Privacy-Based Blockchain for Industrial Internet-of-Things

TL;DR: The proposed model sufficiently exploits advantages of edge computing and blockchain to establish a privacy-preserving mechanism while considering other constraints, such as energy cost, and improves privacy protections without lowering down the performance in an energy-efficient manner.
Proceedings ArticleDOI

SVM-based real-time hardware Trojan detection for many-core platform

TL;DR: A run-time Trojan detection architecture for a custom many-core based on Machine Learning technique that exploits Support Vector Machine (SVM) supervised machine learning algorithms to target different communication attacks triggered by Hardware Trojans.
Journal ArticleDOI

Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach

TL;DR: This paper identifies design constraints for Trojan detection to achieving detection, collusion prevention, and isolating the Trojan-infected 3PIP, and incorporates them during high-level synthesis.
Proceedings ArticleDOI

Runtime Detection of a Bandwidth Denial Attack from a Rogue Network-on-Chip

TL;DR: It is illustrated that a malicious NoC can disrupt the availability of on-chip resources, thereby causing large performance bottlenecks for the software running on the MPSoC platform.
References
More filters
Proceedings ArticleDOI

Architectures for online error detection and recovery in multicore processors

TL;DR: This paper focuses on dependable multicore processor architectures that integrate solutions for online error detection, diagnosis, recovery, and repair during field operation and discusses taxonomy of representative approaches and presents a qualitative comparison based on hardware cost, performance overhead, types of faults detected, and detection latency.
Journal ArticleDOI

A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection

TL;DR: A unified formal framework for integrated circuits (ICs) Trojan detection that can simultaneously employ multiple noninvasive side-channel measurement types (modalities) and a new submodular formulation of the problem objective function is devised.
Journal ArticleDOI

Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges

TL;DR: Globalization of the semiconductor industry and associated supply chains have made integrated circuits increasingly vulnerable to Trojans and researchers must expand efforts to verify trust in intellectual property cores and ICs.
Proceedings ArticleDOI

Tamper Evident Microprocessors

TL;DR: It is shown that it is possible to protect against malicious logic embedded in microprocessor hardware by employing practical, lightweight attack detectors within a microprocessor, and combining TrustNet and DataWatch with prior work on fault detection has the potential to provide complete coverage against a large class of microprocessor attacks.
Related Papers (5)