Handbook of Applied Cryptography
Handbook of Applied Cryptography
A Framework for Security on NoC Technologies
ISVLSI '03 Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI'03)
Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions
Proceedings of the 32nd annual international symposium on Computer Architecture
SECA: security-enhanced communication architecture
Proceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems
A parallelized way to provide data encryption and integrity checking on a processor-memory bus
Proceedings of the 43rd annual Design Automation Conference
A data protection unit for NoC-based architectures
CODES+ISSS '07 Proceedings of the 5th IEEE/ACM international conference on Hardware/software codesign and system synthesis
Hardwired Networks on Chip in FPGAs to Unify Functional and Con?guration Interconnects
NOCS '08 Proceedings of the Second ACM/IEEE International Symposium on Networks-on-Chip
A security monitoring service for NoCs
CODES+ISSS '08 Proceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis
Multi-compartment: a new architecture for secure co-hosting on SoC
SOC'09 Proceedings of the 11th international conference on System-on-chip
Security Primitives for Reconfigurable Hardware-Based Systems
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
MPSoCs run-time monitoring through networks-on-chip
Proceedings of the Conference on Design, Automation and Test in Europe
Proceedings of the 4th International Workshop on Network on Chip Architectures
A denial-of-service resilient wireless NoC architecture
Proceedings of the great lakes symposium on VLSI
Microprocessors & Microsystems
Hi-index | 0.00 |
This paper presents a first solution for NoC-based communication security. Our proposal is based on simple network interfaces implementing distributed security rule checking and a separation between se- curity and application channels. We detail a four- step security policy and show how, with usual NOC techniques, a designer can protect a reconfigurable SOC against attacks that result in abnormal com- munication behaviors. We introduce a new kind of relative and self-complemented street-sign routing adapted to path-based IP identification and recon- figurable architectures needs. Our approach is illus- trated with a synthetic Set-Top box, we also show how to transform a real-life bus-based security so- lution to match our NOC-based architecture.