83
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Mobile devices are in roles where the integrity and confidentiality of their apps and data are of paramount importance. They usually contain a System-on-Chip (SoC), which integrates microprocessors and peripheral Intellectual Property (IP) connected by a Network-on-Chip (NoC). Malicious IP or software could compromise critical data. Some types of attacks can be blocked by controlling data transfers on the NoC using Memory Management Units (MMUs) and other access control mechanisms. However, commodity processors do not provide strong assurances regarding the correctness of such mechanisms, and it is challenging to verify that all access control mechanisms in the system are correctly configured. We propose a NoC Firewall (NoCF) that provides a single locus of control and is amenable to formal analysis. We demonstrate an initial analysis of its ability to resist malformed NoC commands, which we believe is the first effort to detect vulnerabilities that arise from NoC protocol violations perpetrated by erroneous or malicious IP.

          Related collections

          Most cited references17

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            On-Chip Interconnection Architecture of the Tile Processor

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Eliminating the hypervisor attack surface for a more secure cloud

                Bookmark

                Author and article information

                Journal
                1404.3465

                Security & Cryptology
                Security & Cryptology

                Comments

                Comment on this article