Abstract
Intellectual property (IP) has been used in Network on chips (NoCs) for reducing costs and shortening the time to market. However, there is a probability that a third-party vendor injects hardware that behaves maliciously. This study firstly illustrates the security risk of a hardware Trojan for eavesdropping and reducing the system performance by malicious coherent messages. It only increases the amounts of communications and calculations obeying a coherence protocol, allowing applications to perform correctly. This study secondly presents its countermeasure at network interfaces. It compares the number of output messages to input messages at network interfaces to detect malicious coherent messages. This risk causes, on a chip-multiprocessor, execution time to increase by up to 24%, the amount of traffic to increase by up to 18%, and the energy consumption to increase by up to 8.9%. Since the benchmarks in the evaluation are small, we expect that real-life applications would be highly affected by the hardware Trojan. Our countermeasure avoids these performance degradation, and it can be implemented with a significantly low overhead of only 1.3% in a network interface on a chip.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The word “owner” appears frequently in this study. This is not the owner of the owned status in the coherent status, but it is used in the sense of “having the final write back responsibility to the lower cache hierarchy”. Therefore, “the owner core of the data corresponding to a specific address” refers to both the owner of the data corresponding to the address in the owner status and the only core that caches the data corresponding to the address in the modified status in the coherent status.
References
Ancajas, D.M., Chakraborty, K., Roy, S.: Fort-NoCs: mitigating the threat of a compromised NoC. In: Design Automation Conference (DAC), pp. 1–6 (2014)
Charles, S., Mishra, P.: Securing network-on-chip using incremental cryptography. In: Symposium on VLSI (ISVLSI), pp. 168–175 (2020)
Charles, S., Mishra, P.: A survey of network-on-chip security attacks and countermeasures. ACM Comput. Surv. (CSUR) 54(5), 1–36 (2021)
Hussain, M., Malekpour, A., Guo, H., Parameswaran, S.: EETD: an energy efficient design for runtime hardware trojan detection in untrusted network-on-chip. In: Symposium on VLSI (ISVLSI), pp. 345–350 (2018)
Kim, M., Kong, S., Hong, B., Xu, L., Shi, W., Suh, T.: Evaluating coherence-exploiting hardware trojan. In: Design, Automation Test in Europe Conference Exhibition (DATE), pp. 157–162 (2017)
Binkert, N., et al.: The gem5 Simulator. ACM SIGARCH Comput. Archit. News 39(2), 1–7 (2011)
Rajesh, J., Ancajas, D.M., Chakraborty, K., Roy, S.: Runtime detection of a bandwidth denial attack from a rogue network-on-chip. In: International Symposium on Networks-on-Chip, pp. 1–8 (2015)
Raparti, V.Y., Pasricha, S.: Lightweight mitigation of hardware trojan attacks in NoC-based manycore computing. In: Design Automation Conference (DAC), pp. 1–6 (2019)
Ro, Y., Jin, S., Huh, J., Kim, J.: Ghost routing to enable oblivious computation on memory-centric networks. In: International Symposium on Computer Architecture (ISCA), pp. 930–943 (2021)
Tehranipoor, M., Koushanfar, F.: A survey of hardware trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010)
Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards trojan-free trusted ICs: problem analysis and detection scheme. In: Design, Automation and Test in Europe (DATE), pp. 1362–1365 (2008)
Acknowledgments
This work was partly supported by JSPS KAKENHI Grant Number 19H01106.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Shikama, Y., Koibuchi, M., Amano, H. (2023). A Hardware Trojan Exploiting Coherence Protocol on NoCs. In: Takizawa, H., Shen, H., Hanawa, T., Hyuk Park, J., Tian, H., Egawa, R. (eds) Parallel and Distributed Computing, Applications and Technologies. PDCAT 2022. Lecture Notes in Computer Science, vol 13798. Springer, Cham. https://doi.org/10.1007/978-3-031-29927-8_24
Download citation
DOI: https://doi.org/10.1007/978-3-031-29927-8_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-29926-1
Online ISBN: 978-3-031-29927-8
eBook Packages: Computer ScienceComputer Science (R0)