Trustworthiness is an emerging concern in the development of Multi-Processor System-on-Chip (MPSoC) systems, which often include Third-Party Intellectual Property (3PIP) cores. Malicious hardware trojans in these 3PIP components can create a plethora of system vulnerabilities. In this paper, we explore an imminent threat that originates from a 3PIP core: architectural state preserving trojans (TASP). We illustrate that a malicious TASP can affect the performance of a core without altering its architectural state, thereby disrupting the availability of on-chip resources in a MPSoC system. We propose three complementary techniques to detect active TASPs in a 3PIP core with overheads of less than 5%
Interconnection networks for multi/many-core processors or server systems are the backbone of the sy...
In the last few years, security has become one of the key challenges in computing systems. Failures ...
International audience—As the complexity of System-on-Chip (SoC) and the reuse of third party IP con...
International audienceTypical SOC designs use processors and therefore, trust in such processor core...
AbstractThe problem of hardware Trojans is becoming more serious especially with the widespread of f...
International audienceOutsourcing Intellectual Properties (IPs) from vendors around the globe expose...
The semiconductor industry especially digital IC designing is becoming gargantuan due to automation ...
The adoption of large-scale MPSoCs and the globalization of the IC design flow give rise to two majo...
Multiprocessor System-on-Chip (MPSoC) has become necessary due to the billions of transistors availa...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...
The use of side-channel measurements and fingerprinting, in conjunction with statistical analysis, h...
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critic...
Network-on-chip facilitates glueless interconnection of various on-chip components in the forthcomin...
Abstract—Third-party intellectual property (3PIP) cores are widely used in integrated circuit design...
Kiamilev, FouadRecent trends in technology have pushed the majority of ASIC fabrication overseas. Th...
Interconnection networks for multi/many-core processors or server systems are the backbone of the sy...
In the last few years, security has become one of the key challenges in computing systems. Failures ...
International audience—As the complexity of System-on-Chip (SoC) and the reuse of third party IP con...
International audienceTypical SOC designs use processors and therefore, trust in such processor core...
AbstractThe problem of hardware Trojans is becoming more serious especially with the widespread of f...
International audienceOutsourcing Intellectual Properties (IPs) from vendors around the globe expose...
The semiconductor industry especially digital IC designing is becoming gargantuan due to automation ...
The adoption of large-scale MPSoCs and the globalization of the IC design flow give rise to two majo...
Multiprocessor System-on-Chip (MPSoC) has become necessary due to the billions of transistors availa...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...
The use of side-channel measurements and fingerprinting, in conjunction with statistical analysis, h...
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critic...
Network-on-chip facilitates glueless interconnection of various on-chip components in the forthcomin...
Abstract—Third-party intellectual property (3PIP) cores are widely used in integrated circuit design...
Kiamilev, FouadRecent trends in technology have pushed the majority of ASIC fabrication overseas. Th...
Interconnection networks for multi/many-core processors or server systems are the backbone of the sy...
In the last few years, security has become one of the key challenges in computing systems. Failures ...
International audience—As the complexity of System-on-Chip (SoC) and the reuse of third party IP con...