skip to main content
10.1145/2786572.2786580acmconferencesArticle/Chapter ViewAbstractPublication PagesnocsConference Proceedingsconference-collections
research-article

Runtime Detection of a Bandwidth Denial Attack from a Rogue Network-on-Chip

Published: 28 September 2015 Publication History

Abstract

In this paper, we propose a covert threat model for MPSoCs designed using 3rd party Network-on-Chips (NoC). We illustrate that a malicious NoC can disrupt the availability of on-chip resources, thereby causing large performance bottlenecks for the software running on the MPSoC platform. We then propose a runtime latency auditor that enables an MPSoC integrator to monitor the trustworthiness of the deployed NoC throughout the chip lifetime. For the proposed technique, our comprehensive cross-layer analysis indicates modest overheads of 12.73% in area, 9.844% in power and 5.4% in terms of network latency.

References

[1]
SonicsMX SMART Interconnect Datasheet. http://www.http://sonicsinc.com/.
[2]
Abramovici, M., and Bradley, P. Integrated circuit security: new threats and solutions. In CSIIRW (2009), p. 55.
[3]
Alves, T., and Felton, D. TrustZone: integrated hardware and software security. ARM white paper 3, 4 (2004), 18--24.
[4]
Ancajas, D. M. and others Fort-NoCs: Mitigating the Threat of a Compromised NoC. In Proc. of DAC (2014), pp. 1--6.
[5]
Becker, D. Open Source NoC Router RTL, August 2012.
[6]
Diemer, J., and Ernst, R. Back Suction: Service Guarantees for Latency-Sensitive On-chip Networks. In NOCS 2010, Fourth ACM/IEEE International Symposium on Networks-on-Chip, Grenoble, France, May 3-6, 2010 (2010), pp. 155--162.
[7]
Diguet, J.-P. and others NOC-centric Security of Reconfigurable SoC. In NOCS (2007), pp. 223--232.
[8]
Fiorin, L. and others Secure Memory Accesses on Networks-on-Chip. TC 57, 9 (2008), 1216--1229.
[9]
Fiorin, L. and others A security monitoring service for NoCs. In Proc. of CODES-ISSS (2008), pp. 197--202.
[10]
Funk, J. L. Systems, components and modular design: the case of the US semiconductor industry. IJTM 42, 4 (2008), 387--413.
[11]
Gartner Inc. Semiconductor Design IP Revenue, Chip Infrastructure, Worldwide, 2012 and 2013. Gartner Research, March 2014.
[12]
Gebotys, C. H., and Gebotys, R. J. A framework for security on NoC technologies. In IEEE Computer Society Annual Symposium on VLSI (2003), pp. 113--117.
[13]
Grot, B. and others Kilo-NOC: a heterogeneous network-on-chip architecture for scalability and service guarantees. In Proc. of ISCA (2011), pp. 401--412.
[14]
Hestness, J. and others Netrace: dependency-driven trace-based network-on-chip simulation. In NOCS (2010), ACM, pp. 31--36.
[15]
Hoskote, Y. and others A 5-GHz Mesh Interconnect for a Teraflops Processor. IEEE Micro 27, 5 (2007), 51--61.
[16]
Jiang, N. and others A detailed and flexible cycle-accurate Network-on-Chip simulator. In ISPASS (2013), pp. 86--96.
[17]
Kapoor, H. K. and others A Security Framework for NoC Using Authenticated Encryption and Session Keys. Circuits, Systems, and Signal Processing (2013), 1--18.
[18]
Kim, D. and others A network congestion-aware memory controller. In Networks-on-Chip (NOCS) (2010), IEEE, pp. 257--264.
[19]
King, S. T. and others Designing and Implementing Malicious Hardware. vol. 8, pp. 1--8.
[20]
Liu, C. and others Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task scheduling. In Proc. of DFT (2013), pp. 101--106.
[21]
OCP International Partnership. Open Core Protocol Specification: Release 3.0, 2009.
[22]
of Standards, N. I., and Technology. An Introduction to Computer Security: The NIST Handbook.
[23]
Sepúlveda, J. and others Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection. Transactions on Computational Science 10 (2010), 187--201.
[24]
Tehranipoor, M., and Koushanfar, F. A Survey of Hardware Trojan Taxonomy and Detection. DTC 27, 1 (2010), 10--25.
[25]
Waksman, A. and others FANCI: identification of stealthy malicious logic using boolean functional analysis. In ACM Conference on Computer and Communications Security (2013), pp. 697--708.
[26]
Wang, Y., and Suh, G. E. Efficient timing channel protection for on-chip networks. In NOCS (2012), pp. 142--151.
[27]
Wassel, H. M. G. and others SurfNoC: a low latency and provably non-interfering approach to secure networks-on-chip. In Proc. of ISCA (2013), pp. 583--594.
[28]
Wentzlaff, D. and others On-Chip Interconnection Architecture of the Tile Processor. Proc. of MICRO (2007), 15--31.

Cited By

View all
  • (2025)Detection and Localization of Hardware-Assisted Intermittent Power Attacks in Mixed-Critical SystemsIEEE Transactions on Circuits and Systems I: Regular Papers10.1109/TCSI.2024.349338672:2(586-599)Online publication date: Feb-2025
  • (2024)Breaking On-Chip Communication Anonymity Using Flow Correlation AttacksACM Journal on Emerging Technologies in Computing Systems10.1145/367703420:4(1-27)Online publication date: 10-Jul-2024
  • (2024)Lightweight Multicast Authentication in NoC-based SoCs2024 25th International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED60706.2024.10528746(1-8)Online publication date: 3-Apr-2024
  • Show More Cited By

Index Terms

  1. Runtime Detection of a Bandwidth Denial Attack from a Rogue Network-on-Chip

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    NOCS '15: Proceedings of the 9th International Symposium on Networks-on-Chip
    September 2015
    233 pages
    ISBN:9781450333962
    DOI:10.1145/2786572
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 September 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. bandwidth denial
    2. hardware trojan
    3. network-on-chip

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    Conference

    NOCS '15
    NOCS '15: International Symposium on Networks-on-Chip
    September 28 - 30, 2015
    BC, Vancouver, Canada

    Acceptance Rates

    Overall Acceptance Rate 14 of 44 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)25
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 14 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Detection and Localization of Hardware-Assisted Intermittent Power Attacks in Mixed-Critical SystemsIEEE Transactions on Circuits and Systems I: Regular Papers10.1109/TCSI.2024.349338672:2(586-599)Online publication date: Feb-2025
    • (2024)Breaking On-Chip Communication Anonymity Using Flow Correlation AttacksACM Journal on Emerging Technologies in Computing Systems10.1145/367703420:4(1-27)Online publication date: 10-Jul-2024
    • (2024)Lightweight Multicast Authentication in NoC-based SoCs2024 25th International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED60706.2024.10528746(1-8)Online publication date: 3-Apr-2024
    • (2024)Attack and anomaly prediction in networks-on-chip of multiprocessor system-on-chip-based IoT utilizing machine learning approachesService Oriented Computing and Applications10.1007/s11761-024-00393-z18:3(209-223)Online publication date: 8-May-2024
    • (2024)Hardware Trojans Detection and Prevention Techniques ReviewWireless Personal Communications10.1007/s11277-024-11334-6136:2(1147-1182)Online publication date: 25-Jun-2024
    • (2023)SoCurity: A Design Approach for Enhancing SoC SecurityIEEE Computer Architecture Letters10.1109/LCA.2023.330144822:2(105-108)Online publication date: 1-Jul-2023
    • (2023)Evaluation Approach for Efficient Countermeasure Techniques Against Denial-of-Service Attack on MPSoC-Based IoT Using Multi-Criteria Decision-MakingIEEE Access10.1109/ACCESS.2022.323239511(89-106)Online publication date: 2023
    • (2023)A Hardware Trojan Exploiting Coherence Protocol on NoCsParallel and Distributed Computing, Applications and Technologies10.1007/978-3-031-29927-8_24(301-313)Online publication date: 8-Apr-2023
    • (2022)Digital Watermarking for Detecting Malicious Intellectual Property Cores in NoC ArchitecturesIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2022.316760630:7(952-965)Online publication date: Jul-2022
    • (2022)DoS Attack Models and Mitigation Frameworks for NoC-Based SoCsFrontiers of Quality Electronic Design (QED)10.1007/978-3-031-16344-9_15(575-609)Online publication date: 6-Sep-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media