Security Measures Against a Rogue Network-on-Chip
暂无分享,去创建一个
Sanghamitra Roy | Koushik Chakraborty | Dean Michael Ancajas | S. RajeshJ. | Koushik Chakraborty | Sanghamitra Roy | D. Ancajas | S. RajeshJ. | Rajesh JayashankaraShridevi
[1] Avinash Karanth Kodi,et al. Mitigation of Denial of Service Attack with Hardware Trojans in NoC Architectures , 2016, 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS).
[2] Sunggu Lee,et al. A Network Congestion-Aware Memory Controller , 2010, 2010 Fourth ACM/IEEE International Symposium on Networks-on-Chip.
[3] Rolf Ernst,et al. Back Suction: Service Guarantees for Latency-Sensitive On-chip Networks , 2010, 2010 Fourth ACM/IEEE International Symposium on Networks-on-Chip.
[4] Miron Abramovici,et al. Integrated circuit security: new threats and solutions , 2009, CSIIRW '09.
[5] Gianluca Palermo,et al. A security monitoring service for NoCs , 2008, CODES+ISSS '08.
[6] Axel Jantsch,et al. An Analytical Latency Model for Networks-on-Chip , 2013, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[7] E. B. Wilson,et al. The Distribution of Chi-Square. , 1931, Proceedings of the National Academy of Sciences of the United States of America.
[8] Gianluca Palermo,et al. Secure Memory Accesses on Networks-on-Chip , 2008, IEEE Transactions on Computers.
[9] Martha Johanna Sepúlveda,et al. Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection , 2010, Trans. Comput. Sci..
[10] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[11] Guy Gogniat,et al. NOC-centric Security of Reconfigurable SoC , 2007, First International Symposium on Networks-on-Chip (NOCS'07).
[12] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[13] Radu Marculescu,et al. A comprehensive and accurate latency model for Network-on-Chip performance analysis , 2014, 2014 19th Asia and South Pacific Design Automation Conference (ASP-DAC).
[14] Jeffrey L. Funk,et al. Systems, components and modular design: the case of the US semiconductor industry , 2008, Int. J. Technol. Manag..
[15] Catherine H. Gebotys,et al. A framework for security on NoC technologies , 2003, IEEE Computer Society Annual Symposium on VLSI, 2003. Proceedings..
[16] Jeyavijayan Rajendran,et al. Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security- Driven Task Scheduling , 2013, IEEE Transactions on Emerging Topics in Computing.
[17] Ying Gao,et al. SurfNoC: a low latency and provably non-interfering approach to secure networks-on-chip , 2013, ISCA.
[18] T. Alves,et al. TrustZone : Integrated Hardware and Software Security , 2004 .
[19] Hemangee K. Kapoor,et al. A Security Framework for NoC Using Authenticated Encryption and Session Keys , 2013, Circuits, Systems, and Signal Processing.
[20] Nan Jiang,et al. A detailed and flexible cycle-accurate Network-on-Chip simulator , 2013, 2013 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS).
[21] G. Edward Suh,et al. Efficient Timing Channel Protection for On-Chip Networks , 2012, 2012 IEEE/ACM Sixth International Symposium on Networks-on-Chip.
[22] Onur Mutlu,et al. Kilo-NOC: A heterogeneous network-on-chip architecture for scalability and service guarantees , 2011, 2011 38th Annual International Symposium on Computer Architecture (ISCA).
[23] Sriram R. Vangal,et al. A 5-GHz Mesh Interconnect for a Teraflops Processor , 2007, IEEE Micro.
[24] Simha Sethumadhavan,et al. FANCI: identification of stealthy malicious logic using boolean functional analysis , 2013, CCS.
[25] Henry Hoffmann,et al. On-Chip Interconnection Architecture of the Tile Processor , 2007, IEEE Micro.
[26] Yuanyuan Zhou,et al. Designing and Implementing Malicious Hardware , 2008, LEET.
[27] Sanghamitra Roy,et al. Fort-NoCs: Mitigating the threat of a compromised NoC , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[28] Natalie D. Enright Jerger,et al. Moths: Mobile threads for On-Chip Networks , 2010, 2010 19th International Conference on Parallel Architectures and Compilation Techniques (PACT).
[29] Stephen W. Keckler,et al. Netrace: dependency-driven trace-based network-on-chip simulation , 2010, NoCArc '10.