{"title":"Spotlight: An Impairing Packet Transmission Attack Targeting Specific Node in NoC-based TCMP","authors":"Jiaoyan Yao, Ying Zhang, Yifeng Hua, Yuanxiang Li, Jizhong Yang, Xin Chen","doi":"10.1109/ETS56758.2023.10174197","DOIUrl":null,"url":null,"abstract":"As the communication infrastructure utilized by Tiled Chip Multicore Processors (TCMP), Network-on-Chip (NoC) has been subject to serious security vulnerabilities due to hardware Trojans (HTs) concealed in potentially insecure 3PIPs. To satisfy the need for secure NoCs, it is vital to model potential attacks and analyze their impacts on NoC performance. This paper proposes a novel and covert HT model called Spotlight targeting specific victim node in XY-routing NoC to optimize the attacking effect. By inserting Trojans into special nodes and modifying the arbiters of input ports within the switch allocator of router, packets flowing to the victim node are unfairly treated causing considerable latency. As a result, the HT effectively degrades the transmission of packets while having a subtle impact on other NoC performance. The proposed HT is inserted into Garnet 2.0 of Gem5 simulator for performance evaluation. Experimental results indicate that the Spotlight attack increased the average delay of target packets by 12.16 cycles. Compared to some DoS attacks, the proposed Trojan affected packet transmission with fewer packets, causing minimal fluctuates in NoC metrics such as average latency. And the area and power overheads are only 0.94% and 0.11%, respectively.","PeriodicalId":211522,"journal":{"name":"2023 IEEE European Test Symposium (ETS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE European Test Symposium (ETS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETS56758.2023.10174197","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
As the communication infrastructure utilized by Tiled Chip Multicore Processors (TCMP), Network-on-Chip (NoC) has been subject to serious security vulnerabilities due to hardware Trojans (HTs) concealed in potentially insecure 3PIPs. To satisfy the need for secure NoCs, it is vital to model potential attacks and analyze their impacts on NoC performance. This paper proposes a novel and covert HT model called Spotlight targeting specific victim node in XY-routing NoC to optimize the attacking effect. By inserting Trojans into special nodes and modifying the arbiters of input ports within the switch allocator of router, packets flowing to the victim node are unfairly treated causing considerable latency. As a result, the HT effectively degrades the transmission of packets while having a subtle impact on other NoC performance. The proposed HT is inserted into Garnet 2.0 of Gem5 simulator for performance evaluation. Experimental results indicate that the Spotlight attack increased the average delay of target packets by 12.16 cycles. Compared to some DoS attacks, the proposed Trojan affected packet transmission with fewer packets, causing minimal fluctuates in NoC metrics such as average latency. And the area and power overheads are only 0.94% and 0.11%, respectively.