Lightweight security mechanisms for MPSoCs

6Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Computational systems tend to adopt parallel architectures, by using multiprocessor systems-on-chip (MPSoCs). MPSoCs are vulnerable to software and hardware attacks, as infected applications and Hardware Trojans respectively. These attacks may have the purpose to gain access to sensitive data, interrupt a given application or even damage the system physically. The literature presents countermeasures using dedicated routing algorithms, cryptography, firewalls and secure zones. These approaches present a significant hardware cost (firewalls, cryptography) or are too restrictive regarding the use of MPSoC resources (secure zones). The goal of this paper is to present lightweight security mechanisms for MPSoCs, using four techniques: Spatial isolation of applications; dedicated network to send sensitive data; traffic blocking filter; lightweight cryptography. These mechanisms protect the MPSoC against the most common software attacks, as Denial of Service (DoS) and spoofing (man-in-the-middle), and ensures confidentiality and integrity to applications. Results present low area and latency overhead, as well as the effectiveness of using the mechanisms to block malicious traffic.

Cite

CITATION STYLE

APA

Sant’Ana, A. C., Medina, H. M., Fiorentin, K. B., & Moraes, F. G. (2019). Lightweight security mechanisms for MPSoCs. In Proceedings - 32nd Symposium on Integrated Circuits and Systems Design, SBCCI 2019. Association for Computing Machinery, Inc. https://doi.org/10.1145/3338852.3339876

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free