Abstract
Network-on-chip facilitates glueless interconnection of various on-chip components in the forthcoming system-on-chips. As in the case of any new technology, security is a major concern in network-on-chip (NoC) design too. In this work, we explore a covert threat model for multiprocessor system-on-chips (MPSoCs) stemming from the use of malicious third-party network-on-chips (NoCs). We illustrate that a rogue NoC (rNoC) can selectively disrupt the perceived availability of on-chip resources, thereby causing large performance bottlenecks for the applications running on the MPSoC platform. Further, to counter the threat posed by rNoC, we propose a runtime latency auditor that enables an MPSoC integrator to monitor the trustworthiness of the deployed NoC throughout the chip lifetime. We also discuss measures that can be taken to minimize the impact of a rNoC, once it is detected. Our comprehensive cross-layer analysis of our novel detection technique indicates modest overheads of 12.73% in area, 9.844% in power, and 5.4% in terms of network latency.
Similar content being viewed by others
Notes
To eliminate obvious noise, we truncate the data at a minimum NLD of 6.
References
SonicsMX SMART Interconnect Datasheet. http://www.http://sonicsinc.com/
Abramovici M, Bradley P (2009) Integrated circuit security: new threats and solutions CSIIRW, p 55
Alves T, Felton D (2004) TrustZone: integrated hardware and software security. ARM White Paper 3 (4):18–24
Ancajas DM, Chakraborty K, Roy S (2014) Fort-NoCs: mitigating the threat of a compromised NoC. pp 1–6
Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. ACM 53(4)
Auerbach D Volkswagen’s villains. http://www.slate.com/articles/technology/bitwise/2015/10/volkswagen_s_emissions_scandal_has_a_villain_and_it_s_the_not_the_people.html
Becker D (2012) Open source NoC router RTL. https://nocs.stanford.edu/cgi-bin/trac.cgi/wiki/Resources/Router
Boraten T, Kodi AK (2016) Mitigation of denial of service attack with hardware trojans in NoC architectures 2016 IEEE international parallel and distributed processing symposium, IPDPS 2016, Chicago, IL, USA, May 23–27, 2016, pp 1091–1100
Diemer J, Ernst R (2010) Back suction: service guarantees for latency-sensitive on-chip networks. pp 155–162
Diguet J.-P., Evain S, Vaslin R, Gogniat G, Juin E (2007) NOC-centric security of reconfigurable SoC. pp 223–232
Fiorin L, Palermo G, Lukovic S, Catalano V, Silvano C (2008) Secure memory accesses on networks-on-chip. TC 57(9):1216–1229
Fiorin L, Palermo G, Silvano C (2008) A security monitoring service for NoCs. pp 197–202
Funk JL (2008) Systems, components and modular design: the case of the US semiconductor industry. IJTM 42(4):387–413
Gartner Inc (2014) Semiconductor design IP revenue, chip infrastructure, worldwide 2012 and 2013. Gartner Research
Gebotys CH, Gebotys RJ (2003) A framework for security on NoC technologies. pp 113–117
Grot B, Hestness J, Keckler SW, Mutlu O (2011) Kilo-NOC: a heterogeneous network-on-chip architecture for scalability and service guarantees. pp 401–412
Hestness J, Grot B, Keckler SW (2010) Netrace: dependency-driven trace-based network-on-chip simulation. ACM, pp 31–36
Hoskote Y, Vangal SR, Singh A, Borkar N, Borkar S (2007) A 5-GHz mesh interconnect for a teraflops processor. IEEE MICRO 27(5):51–61
Jiang N, Becker D, Michelogiannakis G, Balfour J, Towles B, Shaw D, Kim J, Dally W (2013) A detailed and flexible cycle-accurate network-on-chip simulator. pp 86–96
Kapoor HK, Rao GB, Arshi S, Trivedi G (2013) A security framework for NoC using authenticated encryption and session keys. 1–18
Kiasari AE, Lu Z, Jantsch A (2013) An analytical latency model for networks-on-chip. TVLSI 21 (1):113–123
Kim D, Yoo S, Lee S (2010) A network congestion-aware memory controller. IEEE, pp 257–264
King ST, Tucek J, Cozzie A, Grier C, Jiang W, Zhou Y (2008) Designing and implementing malicious hardware. vol 8, pp 1– 8
Liu C, Rajendran J, Yang C, Karri R (2013) Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task scheduling. pp 101–106
Misler M, Jerger NDE (2013) Moths: mobile threads for on-chip networks. TEC 12(1s):56
User, Assurance and Planning, Audit (1995) An Introduction to Computer Security: The NIST Handbook
OCP International Partnership (2009) Open core protocol specification: Release 3.0
Qian Z, Juan D, Bogdan P, Tsui C, Marculescu D, Marculescu R (2014) A comprehensive and accurate latency model for network-on-chip performance analysis. pp 323–328
Sepúlveda J, Pires R, Strum M, Chau WJ (2010) Implementation of QoSS (quality-of-security service) for NoC-based SoC protection. Theor Comput Sci 10:187–201
Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. DTC 27 (1):10–25
Waksman A, Suozzo M, Sethumadhavan S (2013) FANCI: identification of stealthy malicious logic using Boolean functional analysis. pp 697–708
Wang Y, Suh GE (2012) Efficient timing channel protection for on-chip networks. pp 142–151
Wassel HMG, Gao Y, Oberg J, Huffmire T, Kastner R, Chong FT, Sherwood T (2013) SurfNoC: a low latency and provably non-interfering approach to secure networks-on-chip. pp 583– 594
Wentzlaff D, Griffin P, Hoffmann H, Bao L, Edwards B, Ramey C, Mattina M, Miao C-C, Brown III JF, Agarwal A (2007) On-chip interconnection architecture of the tile processor. 15–31
Wilson EB, Hilferty MM (1931) The distribution of chi-square. Proc Nat Acad Sci USA 17(12):684–688
Acknowledgments
This work was supported in part by the National Science Foundation grants (CNS-1117425, CAREER-1253024, CCF-1318826, CNS-1421022, CNS-1421068). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
JayashankaraShridevi, R., Ancajas, D.M., Chakraborty, K. et al. Security Measures Against a Rogue Network-on-Chip. J Hardw Syst Secur 1, 173–187 (2017). https://doi.org/10.1007/s41635-017-0008-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41635-017-0008-z