What can a remote access hardware trojan do to a network-on-chip?

MM Ahmed, A Dhavlle, N Mansoor… - … on Circuits and …, 2021 - ieeexplore.ieee.org
Interconnection networks such as Network-on-Chips (NoCs) for multi/many-core processors
are critical infrastructure of the system as they enable data communication among the …

Defense against on-chip trojans enabling traffic analysis attacks

MM Ahmed, A Dhavlle, N Mansoor… - … Security and Trust …, 2020 - ieeexplore.ieee.org
Interconnection networks for multi/many-core processors or server systems are the
backbone of the system as they enable data communication among the processing cores …

A benchmark suite of hardware trojans for on-chip networks

J Wang, S Guo, Z Chen, T Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
As recently studied, network-on-chip (NoC) suffers growing threats from hardware trojans
(HTs), leading to performance degradation or information leakage when it provides …

LOKI: a hardware trojan affecting multiple components of an SOC

M Rajan, A Das, J Jose - 2022 IEEE Computer Society Annual …, 2022 - ieeexplore.ieee.org
Outsourcing Intellectual Properties (IPs) from vendors around the globe exposes System-on-
Chip (SoC) designs to malicious implants like Hardware Trojans (HTs). Carefully crafted HTs …

SECTAR: Secure NoC using Trojan aware routing

R Manju, A Das, J Jose, P Mishra - 2020 14th IEEE/ACM …, 2020 - ieeexplore.ieee.org
System-on-Chips (SoCs) are designed using different Intellectual Property (IP) blocks from
multiple third-party vendors to reduce design cost while meeting aggressive time-to-market …

Open-source NoC-based many-core for evaluating hardware trojan detection methods

I Weber, G Marchezan, L Caimi… - … on Circuits and …, 2020 - ieeexplore.ieee.org
In many-cores based on Network-on-Chip (NoC), several applications execute
simultaneously, sharing computation, communication and memory resources. This resource …

Defense against on-chip trojans enabling traffic analysis attacks based on machine learning and data augmentation

A Dhavlle, MM Ahmed, N Mansoor… - … on Computer-Aided …, 2023 - ieeexplore.ieee.org
Modern computing systems involve huge data exchange across various sections of the
processing system. To facilitate this, network-on-chip (NoC) serves as a crucial infrastructure …

Trojan aware network-on-chip routing

M Rajan, A Das, J Jose, P Mishra - Network-on-chip security and privacy, 2021 - Springer
To meet the time-to-market constraints and design cost of Internet-of-Things (IoT) devices
and embedded systems, System-on-Chips (SoCs) started using third party Intellectual …

Invariance checking based Trojan detection method for three-dimensional integrated circuits

Z Zhang, Q Yu - 2020 IEEE international symposium on circuits …, 2020 - ieeexplore.ieee.org
Recently literature indicates that stack based three-dimensional (3D) integration techniques
may bring in new security vulnerabilities, such as new attack surfaces for hardware Trojan …

Lightweight mitigation of hardware Trojan attacks in NoC-based manycore computing

VY Raparti, S Pasricha - Proceedings of the 56th Annual Design …, 2019 - dl.acm.org
Data-snooping is a serious security threat in NoC fabrics that can lead to theft of sensitive
information from applications executing on manycore processors. Hardware Trojans (HTs) …