Exploiting Process Variations to Secure Photonic NoC Architectures From Snooping Attacks

نویسندگان

چکیده

The compact size and high wavelength-selectivity of microring resonators (MRs) enable photonic networks-on-chip (PNoCs) to utilize dense-wavelength-division-multiplexing (DWDM) in their waveguides, as a result, attain bandwidth on-chip data transfers. Unfortunately, hardware Trojan (HT) PNoC can manipulate the electrical driving circuit its MRs cause snoop from neighboring wavelength channels shared waveguide, which introduces serious security threat. This article presents framework that utilizes process variation-based authentication signatures along with architecture-level enhancements protect against data-snooping HT during unicast well multicast transfers PNoCs. evaluation results indicate our improve across various architectures minimal overheads up 14.2% average latency 14.6% energy-delay-product (EDP).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs

The Universal Serial Bus (USB) is the most prominent interface for connecting peripheral devices to computers. USB-connected input devices, such as keyboards, cardswipers and fingerprint readers, often send sensitive information to the computer. As such information is only sent along the communication path from the device to the computer, it was hitherto thought to be protected from potentially...

متن کامل

From Secure Business Process Models to Secure Artifact-Centric Specifications

Making today’s systems secure is an extremely difficult and challenging problem. Socio and technical issues interplay and contribute in creating vulnerabilities that cannot be easily prevented without a comprehensive engineering method. This paper presents a novel approach to support process-aware secure systems modeling and automated generation of secure artifact-centric implementations. It co...

متن کامل

Service-Oriented Architectures: From Design to Production Exploiting Workflow Patterns

Service-Oriented Architecture Workflow Patterns Coloured Petri Nets In Service-Oriented Architectures (SOA) services are composed by coordinating their communications into a flow of interactions. Coloured Petri nets (CPN) offer a formal yet easy tool for modelling abstract SOAs. Still, mapping abstract SOAs into executable ones requires a non-trivial and time-costly analysis. Here, we propose a...

متن کامل

Multiple Vdd on 3D NoC architectures

The communication problem is a challenge issue for Integrated Circuits (ICs), which usually becomes a bottleneck for performance improvement. Three-dimensional integration (3D), as well as network-on-chip (NoC), are two recent design approaches that promise to alleviate the consequences of interconnection degradation. This paper introduces a new methodology for powerefficient application mappin...

متن کامل

Multi-objective Mapping for NoC Architectures

In order to improve the performance of current embedded systems, Network -on-Chip (NoC) offers many advantages, especially in terms of flexibility and low cost. Applications require more and more intensive computations, especially multimedia applications such as video encoding. Developing product and application using such an architecture offers many challenges and opportunities. Many tools wil...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

سال: 2021

ISSN: ['1937-4151', '0278-0070']

DOI: https://doi.org/10.1109/tcad.2020.3014184