Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques

  • Thejaswini P Electronics and Communication Engineering Department, JSS Academy of Technical Education, Bangalore
  • Vivekananda G Electronics and Communication Engineering Department, JSS Academy of Technical Education, Bangalore
  • Anu H Electronics and Communication Engineering Department, JSS Academy of Technical Education, Bangalore
  • Priya R Electronics and Communication Engineering Department, JSS Academy of Technical Education, Bangalore
  • Krishna Prasad B S Electronics and Communication Engineering Department, JSS Academy of Technical Education, Bangalore
  • Nischay M Electronics and Communication Engineering Department, JSS Academy of Technical Education, Bangalore
Keywords: Noc, Hardware Security, Hardware Trojans, Obfuscation, Misrouting

Abstract

Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency. NoC is a communication architecture used in the processor cores to transfer  data from source to destination through several nodes. Since NoC deals with on-chip interconnection for data transmission, it will be a good prey for data leakage and other security attacks. One such way of attacking is done by a third-party vendor introducing Hardware Trojans (HTs) into routers of NoC architecture. This can cause packets to traverse in wrong paths, leak/extract information and cause Denial-of-Service (DoS) degrading the system performance. In this paper, a novel HT detection and mitigation approach using obfuscation and key-based authentication technique is proposed. The proposed technique prevents any illegal transitions between routers thereby protecting data from malicious activities, such as packet misrouting and information leakage. The proposed technique is evaluated on a 4x4 NoC architecture under synthetic traffic pattern and benchmarks, the hardware model is synthesized in Cadence Tool with 90nm technology. The introduced Hardware Trojan affects 8% of packets passing through infected router. Experimental results demonstrate that the proposed technique prevents those 10-15% of packets infected from the HT effect. Our proposed work has negligible power and area overhead of 8.6% and  2% respectively.

Downloads

Download data is not yet available.

References

Rajesh, J. S., Koushik Chakraborty and Sanghamitra Roy. Hardware trojan attacks in soc and noc. In The Hardware Trojan War, pp. 55-74. Springer, Cham, 2018. DOI: https://doi.org/10.1007/978-3-319-68511-3_3

Mishra, Prabhat, and Subodha Charles, eds. Network-on-Chip Security and Privacy. Springer Nature, 2021. DOI: https://doi.org/10.1007/978-3-030-69131-8

Hoefflinger, Bernd. ITRS: The international technology roadmap for semiconductors. In Chips 2020, pp. 161-174. Springer, Berlin, Heidelberg, 2011. DOI: https://doi.org/10.1007/978-3-642-23096-7_7

Swarbrick, Ian, et al. Network-on-chip programmable platform in VersalTM ACAP architecture. Proceedings of the 2019 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays. 2019.

Charles, Subodha, and Prabhat Mishra. A survey of network-on-chip security attacks and countermeasures. ACM Computing Surveys (CSUR) 54, no. 5 (2021): 1-36. DOI: https://doi.org/10.1145/3450964

Jindal, Neetu, et al. Enhancing network-on-chip performance by reusing trace buffers. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 39.4 (2019): 922-935. DOI: https://doi.org/10.1109/TCAD.2019.2907909

Diallo, Papa Issa, Seyed-Hosein Attarzadeh-Niaki, Francesco Robino, Ingo Sander, Joel Champeau, and Johnny Oberg. A formal, model-driven design flow for system simulation and multi-core implementation. In 10th IEEE International Symposium on Industrial Embedded Systems (SIES), pp. 1-10. IEEE, 2015. DOI: https://doi.org/10.1109/SIES.2015.7185067

Abramovici, Miron and Paul Bradley. Integrated circuit security: new threats and solutions. In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, pp. 1-3. 2009. DOI: https://doi.org/10.1145/1558607.1558671

Bhunia, Swarup, Michael S. Hsiao, Mainak Banga and Seetharam Narasimhan. Hardware Trojan attacks: Threat analysis and countermeasures. Proceedings of the IEEE 102, no. 8 (2014): 1229-1247. DOI: https://doi.org/10.1109/JPROC.2014.2334493

Liakos, Konstantinos G., et al. Conventional and machine learning approaches as countermeasures against hardware trojan attacks. Microprocessors and Microsystems 79, 2020. DOI: https://doi.org/10.1016/j.micpro.2020.103295

Frey, Jonathan and Qiaoyan Yu. A hardened network-on-chip design using runtime hardware Trojan mitigation methods. Integration 56: 15-31, 2017. DOI: https://doi.org/10.1016/j.vlsi.2016.06.008

Manju, R., Abhijit Das, John Jose, and Prabhat Mishra. SECTAR: Secure NoC using Trojan Aware Routing. In 2020 14th IEEE/ACM International Symposium on Networks-on-Chip (NOCS), pp. 1-8. IEEE, 2020. DOI: https://doi.org/10.1109/NOCS50636.2020.9241711

Hussain, Mubashir. Runtime Detection of Hardware Trojan in Untrusted Network-on-Chip. Diss. UNSW Sydney, 2018.

Harttung, Julian, et al. Lightweight authenticated encryption for network-on-chip communications. Proceedings of the 2019 on Great Lakes Symposium on VLSI. 2019. DOI: https://doi.org/10.1145/3299874.3317990

JYV, Manoj Kumar, Ayas Kanta Swain, Sudeendra Kumar, Sauvagya Ranjan Sahoo and Kamalakanta Mahapatra. Run time mitigation of performance degradation hardware trojan attacks in network on chip. In 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 738-743. IEEE, 2018.

Boraten, Travis and Avinash Karanth Kodi. Mitigation of denial of service attack with hardware trojans in noc architectures. In 2016 IEEE international parallel and distributed processing symposium (IPDPS), pp. 1091-1100. IEEE, 2016. DOI: https://doi.org/10.1109/IPDPS.2016.59

Raparti, Venkata Yaswanth, and Sudeep Pasricha. Lightweight mitigation of hardware Trojan attacks in NoC-based manycore computing. 2019 56th ACM/IEEE Design Automation Conference (DAC). IEEE, 2019. DOI: https://doi.org/10.1145/3316781.3317851

Frey, Jonathan and Qiaoyan Yu. Exploiting state obfuscation to detect hardware trojans in NoC network interfaces. In 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 1-4. IEEE, 2015. DOI: https://doi.org/10.1109/MWSCAS.2015.7282167

Shalaby, Ahmed, et al. Sentry-NoC: a statically-scheduled NoC for secure SoCs. 2021 15th IEEE/ACM International Symposium on Networks-on-Chip (NOCS). IEEE, 2021. DOI: https://doi.org/10.1145/3479876.3481595

Daoud, Luka, and Nader Rafla. Routing aware and runtime detection for infected network-on-chip routers. 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2018. DOI: https://doi.org/10.1109/MWSCAS.2018.8623972

Kumar, JYV Manoj, Ayas Kanta Swain, and Kamalakanta Mahapatra. Fortified-NoC: A Robust Approach for Trojan-Resilient Network-on-Chips to Fortify Multicore-Based Consumer Electronics. IEEE Transactions on Consumer Electronics 68.1 (2021): 57-68. DOI: https://doi.org/10.1109/TCE.2021.3129155

Bahrebar, Poona, and Dirk Stroobandt. Abacus turn model-based routing for NoC interconnects with switch or link failures. Microprocessors and Microsystems 59 (2018): 69-91. DOI: https://doi.org/10.1016/j.micpro.2018.01.005

Azar, Kimia Zamiri, et al. {COMA}: Communication and Obfuscation Management Architecture. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). 2019.

Power, J. Hestness, M. S. Orr, M. D. Hill and D. A. Wood, gem5-gpu: A Heterogeneous CPU-GPU Simulator In IEEE Computer Architecture Letters, vol. 14, no. 1, pp. 34-36, 1 Jan.-June 2015. DOI: https://doi.org/10.1109/LCA.2014.2299539

Alireza Monemi, Jia Wei Tang, Maurizio Palesi, and Muhammad N Marsono. ProNoC: A low latency network-on-chip based many-core system-on-chip prototyping platform. Microprocessors and Microsystems, 54:60–74, 2017. DOI: https://doi.org/10.1016/j.micpro.2017.08.007

Alireza Monemi, Chia Yee Ooi, Muhammad Nadzir Marsono, and Maurizio Palesi. Improved flow control for minimal fully adaptive routing in 2D mesh NoC. In Proceedings of the 9th International Workshop on Network on Chip Architectures, NoCArc’16, pages 9–14. ACM, 2016. DOI: https://doi.org/10.1145/2994133.2994134

Alireza Monemi, Chia Yee Ooi, and Muhammad Nadzir Marsono. Low latency networkon-chip router microarchitecture using request masking technique. International Journal of Reconfigurable Computing, 2015:2, 2015 DOI: https://doi.org/10.1155/2015/570836

Alireza Monemi, Chia Yee Ooi, Maurizio Palesi, and Muhammad Nadzir Marsono. Low latency network-on-chip router using static straight allocator. In Proceedings of 3rd International Conference on Information Technology, Computer and Electrical Engineering, ICITACEE’16. IEEE, 2016. DOI: https://doi.org/10.1109/ICITACEE.2016.7892399

Published
2022-12-30
How to Cite
Thejaswini P, G, V., Anu H, Priya R, Krishna Prasad B S, & Nischay M. (2022). Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques. EMITTER International Journal of Engineering Technology, 10(2), 370-388. https://doi.org/10.24003/emitter.v10i2.716
Section
Articles