Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3479876.3481597acmconferencesArticle/Chapter ViewAbstractPublication PagesnocsConference Proceedingsconference-collections
research-article

Packet header attack by hardware trojan in NoC based TCMP and its impact analysis

Published: 08 October 2021 Publication History

Abstract

With the advancement of VLSI technology, Tiled Chip Multicore Processors (TCMP) with packet switched Network-on-Chip (NoC) have been emerged as the backbone of the modern data intensive parallel systems. Due to tight time-to-market constraints, manufacturers are exploring the possibility of integrating several third-party Intellectual Property (IP) cores in their TCMP designs. Presence of malicious Hardware Trojan (HT) in the NoC routers can adversely affect communication between tiles leading to degradation of overall system performance. In this paper, we model an HT mounted on the input buffers of NoC routers that can alter the destination address field of selected NoC packets. We study the impact of such HTs and analyse its first and second order impacts at the core level, cache level, and NoC level both quantitatively and qualitatively. Our experimental study shows that the proposed HT can bring application to a complete halt by stalling instruction issue and can significantly impact the miss penalty of L1 caches. The impact of re-transmission techniques in the context of HT impacted packets getting discarded is also studied. We also expose the unrealistic assumptions and unacceptable latency overheads of existing mitigation techniques for packet header attacks and emphasise the need for alternative cost effective HT management techniques for the same.

References

[1]
Dean Michael Ancajas, Koushik Chakraborty, and Sanghamitra Roy. 2014. Fort-NoCs: Mitigating the threat of a compromised NoC. In Design Automation Conference. 1--6.
[2]
Luca Benini and Giovanni De Micheli. 2002. Networks on chips: A new SoC paradigm. Computer 35, 1 (2002), 70--78.
[3]
Nathan Binkert et al. 2011. The gem5 simulator. ACM SIGARCH Computer Architecture News 39, 2 (2011), 1--7.
[4]
Travis Boraten and Avinash Kodi. 2018. Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs. Journal of Parallel and Distributed Computing 111 (2018), 24--38.
[5]
Subodha Charles, Yangdi Lyu, and Prabhat Mishra. 2019. Real-time detection and localization of DoS attacks in NoC based SoCs. In Design, Automation & Test in Europe Conference & Exhibition. IEEE, 1160--1165.
[6]
George Chrysos. 2014. Intel® Xeon Phi coprocessor - The Architecture. Intel Whitepaper 176 (2014), 43--50.
[7]
Abhijit Das, Sarath Babu, John Jose, Sangeetha Jose, and Maurizio Palesi. 2018. Critical packet prioritisation by slack-aware re-routing in on-chip networks. In International Symposium on Networks-on-Chip. IEEE, 1--8.
[8]
Farimah Farahmandi, Yuanwen Huang, and Prabhat Mishra. 2019. System-on-Chip Security: Validation and Verification. Springer Nature.
[9]
John L Henning. 2006. SPEC CPU2006 benchmark descriptions. ACM SIGARCH Computer Architecture News 34, 4 (2006), 1--17.
[10]
Mubashir Hussain and Hui Guo. 2017. Packet leak detection on hardware-trojan infected NoCs for MPSoC systems. In International Conference on Cryptography, Security and Privacy. 85--90.
[11]
Manoj Kumar JYV, Ayas Kanta Swain, Sudeendra Kumar, Sauvagya Ranjan Sahoo, and Kamalakanta Mahapatra. 2018. Run time mitigation of performance degradation hardware trojan attacks in network on chip. In Computer Society Annual Symposium on VLSI. IEEE, 738--743.
[12]
He Li, Qiang Liu, and Jiliang Zhang. 2016. A survey of hardware Trojan threat and defense. Integration 55 (2016), 426--437.
[13]
R Manju, Abhijit Das, John Jose, and Prabhat Mishra. 2020. SECTAR: Secure NoC using Trojan Aware Routing. In International Symposium on Networks-on-Chip. IEEE, 1--8.
[14]
Alireza Monemi, Jia Wei Tang, Maurizio Palesi, and Muhammad N Marsono. 2017. ProNoC: A low latency network-on-chip based many-core system-on-chip prototyping platform. Microprocessors and Microsystems 54 (2017), 60--74.
[15]
Sadia Moriam, Elke Franz, Paul Walther, Akash Kumar, Thorsten Strufe, and Gerhard Fettweis. 2021. Efficient Communication Protection of Many-Core Systems against Active Attackers. Electronics 10, 3 (2021), 1--31.
[16]
Nachiketh Potlapally. 2011. Hardware Security in Practice: Challenges and Opportunities. In International Symposium on Hardware-Oriented Security and Trust. IEEE, 93--98.
[17]
Manju Rajan, Abhijit Das, John Jose, and Prabhat Mishra. 2021. Trojan Aware Network-on-Chip Routing. Network-on-Chip Security and Privacy (2021), 277--310.
[18]
Anderson Camargo Sant'Ana, Henrique Medina, and Fernando Gehm Moraes. 2021. Security Vulnerabilities and Countermeasures in MPSoCs. IEEE Design & Test (2021).
[19]
Johanna Sepúlveda, Daniel Flórez, and Guy Gogniat. 2015. Reconfigurable security architecture for disrupted protection zones in NoC-based MPSoCs. In International Symposium on Reconfigurable Communication-centric Systems-on-Chip. IEEE, 1--8.
[20]
Gaurav Sharma, Georgios Bousdras, Soultana Ellinidou, Olivier Markowitch, Jean-Michel Dricot, and Dragomir Milojevic. 2021. Exploring the security landscape: NoC-based MPSoC to Cloud-of-Chips. Microprocessors and Microsystems 84 (2021), 1--16.
[21]
Kan Xiao, Domenic Forte, Yier Jin, Ramesh Karri, Swarup Bhunia, and Mohammad Tehranipoor. 2016. Hardware Trojans: Lessons learned after one decade of research. ACM Transactions on Design Automation of Electronic Systems 22, 1 (2016), 1--23.
[22]
Jiaqi Yao, Ying Zhang, Zhiming Mao, Sen Li, Minghui Ge, and Xin Chen. 2020. On-line Detection and Localization of DoS Attacks in NoC. In Joint International Information Technology and Artificial Intelligence Conference, Vol. 9. IEEE, 173--178.

Cited By

View all
  • (2024)TROP: TRust-aware OPportunistic Routing in NoC with Hardware TrojansACM Transactions on Design Automation of Electronic Systems10.1145/363982129:2(1-25)Online publication date: 15-Feb-2024
  • (2023)Visual Exploratory Analysis for Designing Large-Scale Network-on-Chip Architectures: A Domain Expert-Led Design StudyIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2023.333717330:4(1970-1983)Online publication date: 28-Nov-2023
  • (2023) edAttack : Hardware Trojan Attack on On-Chip Packet Compression IEEE Design & Test10.1109/MDAT.2023.330671840:6(125-135)Online publication date: Dec-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
NOCS '21: Proceedings of the 15th IEEE/ACM International Symposium on Networks-on-Chip
October 2021
91 pages
ISBN:9781450390835
DOI:10.1145/3479876
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

  • IEEE CAS
  • IEEE Council on Electronic Design Automation (CEDA)

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 October 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. hardware trojan
  2. network-on-chip security
  3. packet header attack
  4. secured TCMP design
  5. trojan impact

Qualifiers

  • Research-article

Funding Sources

  • ISEA Project Phase II, MEITY, Govt. of India

Conference

NOCS '21

Acceptance Rates

Overall Acceptance Rate 14 of 44 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)59
  • Downloads (Last 6 weeks)10
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)TROP: TRust-aware OPportunistic Routing in NoC with Hardware TrojansACM Transactions on Design Automation of Electronic Systems10.1145/363982129:2(1-25)Online publication date: 15-Feb-2024
  • (2023)Visual Exploratory Analysis for Designing Large-Scale Network-on-Chip Architectures: A Domain Expert-Led Design StudyIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2023.333717330:4(1970-1983)Online publication date: 28-Nov-2023
  • (2023) edAttack : Hardware Trojan Attack on On-Chip Packet Compression IEEE Design & Test10.1109/MDAT.2023.330671840:6(125-135)Online publication date: Dec-2023
  • (2023)Modelling and Impact Analysis of Push Back Attack in 3D Bufferless Network on Chip2023 IEEE 16th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSoC)10.1109/MCSoC60832.2023.00070(426-432)Online publication date: 18-Dec-2023
  • (2023)Impact Analysis of Distributed DoS Attack by Multiple HTs in TCMP Architectures2023 International Conference on Control, Communication and Computing (ICCC)10.1109/ICCC57789.2023.10165276(1-6)Online publication date: 19-May-2023
  • (2023)Spotlight: An Impairing Packet Transmission Attack Targeting Specific Node in NoC-based TCMP2023 IEEE European Test Symposium (ETS)10.1109/ETS56758.2023.10174197(1-4)Online publication date: 22-May-2023
  • (2023)Wireless Network-on-Chip Security Review: Attack Taxonomy, Implications, and CountermeasuresIEEE Access10.1109/ACCESS.2023.332957211(122876-122892)Online publication date: 2023
  • (2023)Secure Routing Framework for Mitigating Time-Delay Trojan Attack in System-on-ChipJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2023.103006144:COnline publication date: 1-Nov-2023
  • (2022)Runtime Detection of Time-Delay Security Attack in System-an-Chip2022 15th IEEE/ACM International Workshop on Network on Chip Architectures (NoCArc)10.1109/NoCArc57472.2022.9911380(1-6)Online publication date: 2-Oct-2022
  • (2022)Electronic, Wireless, and Photonic Network-on-Chip Security: Challenges and CountermeasuresIEEE Design & Test10.1109/MDAT.2022.320301739:6(90-98)Online publication date: Dec-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media