Using Pattern of On-Off Routers and Links and Router Delays to Protect Network-on-Chip Intellectual Property

Author:

Biswas Arnab Kumar1ORCID

Affiliation:

1. Centre for Secure Information Technologies, School of Electronics, Electrical Engineering and Computer Science, Queen’s University Belfast, Belfast, UK

Abstract

Intellectual Property (IP) reuse is a well known practice in chip design processes. Nowadays, network-on-chips (NoCs) are increasingly used as IP and sold by various vendors to be integrated in a multiprocessor system-on-chip (MPSoC). However, IP reuse exposes the design to IP theft, and an attacker can launch IP stealing attacks against NoC IPs. With the growing adoption of MPSoC, such attacks can result in huge financial losses. In this article, we propose four NoC IP protection techniques using fingerprint embedding: ON-OFF router-based fingerprinting (ORF), ON-OFF link-based fingerprinting (OLF), Router delay-based fingerprinting (RTDF), and Row delay-based fingerprinting (RWDF). ORF and OLF techniques use patterns of ON-OFF routers and links, respectively, while RTDF and RWDF techniques use router delays to embed fingerprints. We show that all of our proposed techniques require much less hardware overhead compared to an existing NoC IP security solution (square spiral routing) and also provide better security from removal and masking attacks. In particular, our proposed techniques require between 40.75% and 48.43% less router area compared to the existing solution. We also show that our solutions do not affect the normal packet latency and hence do not degrade the NoC performance.

Publisher

Association for Computing Machinery (ACM)

Subject

General Computer Science

Reference15 articles.

1. United States National Institute of Standards and Technology (NIST). 2001. Announcing the Advanced Encryption Standard (AES). Retrieved November 26 2001 from https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.197.pdf.

2. Toshihiro Katashita and Akashi Satoh. 2013. Electronic circuit component authenticity determination method. US Patent 2013/0127442 May 23 2013.

3. Georg T. Becker, Marc Fyrbiak, and Christian Kison. 2017. Hardware Obfuscation: Techniques and Open Challenges. Springer International Publishing, 105–123.

4. A Blind Dynamic Fingerprinting Technique for Sequential Circuit Intellectual Property Protection

5. Juergen Teich and Daniel Ziener. 2007. Watermarking apparatus software enabling an implementation of an electronic circuit comprising a watermark Method for Detecting a Watermark and Apparatus for Detecting a Watermark. US Patent 2007/0220263 September 20 2007.

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3