Guard-NoC

A protection against side-channel attacks for MPSoCs

Conference Paper (2020)
Author(s)

Cezar Rodolfo Wedig Reinbrecht (TU Delft - Computer Engineering)

Abdullah Aljuffri (TU Delft - Computer Engineering)

S. Hamdioui (TU Delft - Quantum & Computer Engineering)

Mottaqiallah Taouil (TU Delft - Computer Engineering)

Bruno Forlin (Universidade Federal do Rio Grande do Sul)

Johanna Sepulveda (AirBus Defence and Space GmbH)

Research Group
Computer Engineering
Copyright
© 2020 Cezar Reinbrecht, A.A.M. Aljuffri, S. Hamdioui, M. Taouil, Bruno E. Forlin, Johanna Sepulveda
DOI related publication
https://doi.org/10.1109/ISVLSI49217.2020.000-1
More Info
expand_more
Publication Year
2020
Language
English
Copyright
© 2020 Cezar Reinbrecht, A.A.M. Aljuffri, S. Hamdioui, M. Taouil, Bruno E. Forlin, Johanna Sepulveda
Research Group
Computer Engineering
Bibliographical Note
Accepted author manuscript@en
Pages (from-to)
536-541
ISBN (print)
978-1-7281-5776-4
ISBN (electronic)
978-1-7281-5775-7
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Multi-Processor System-on-Chips (MPSoCs) are popular computational platforms for a wide variety of applications due to their energy efficiency and flexibility. Like many other platforms they are vulnerable to Side Channel Attacks (SCAs). In particular, Logical SCAs (LSCAs) are very powerful as sensitive information can be retrieved by simply observing system properties that depend on the victim's software execution on the MPSoC. Unfortunately, many of the current protection mechanisms are either platform dependent or are effective only against a reduced set of attacks. In this work, we present Guard-NoC, a secure Network-on-Chip (NoC) architecture able to protect MPSoCs against a wide variety of LSCAs. The secure NoC employs three application-independent strategies to hide and isolate sensitive information: i) blinding the execution time of operations; ii) masking the execution time of operations; and iii) dual communication strategy (i.e., use packet and circuit switching simultaneously). Our results show that our secure NoC is resilient against practical LSCAs and leaks almost no information while having a minimal area and power overhead.

Files

License info not available