Professional Documents
Culture Documents
Attacks in Networks-on-Chip
N Prasad, Rajit Karmakar, Santanu Chattopadhyay, and Indrajit Chakrabarti
Department of Electronics and Electrical Communication Engineering
Indian Institute of Technology, Kharagpur, WB 721302, India
{nprasad,rajit,santanu,indrajit}@ece.iitkgp.ernet.in
Abstract—A novel Denial-of-Service attack for Networks-on- the type of attack, they have been implemented at a cost of
Chip, namely illegal packet request attack (IPRA), has been area and execution time. Boraten and Kodi [2] have proposed
proposed and measures to mitigate the same have been addressed. a packet validation technique called P-Sec, for protecting com-
Hardware Trojans, which cause these attacks, are conditionally
triggered inside the routers at the buffer sites associated with promised NoC architectures. The attacks considered are fault
local core, when the core is idle. These attacks contribute to injection side channel attacks and covert hardware Trojan (HT)
the degradation of network performance and may even create attacks on NoC links. Though P-Sec can secure the packet
deadlocks, which can raise serious concerns in time critical information while the packets are flowing in the network, it
systems. A security unit has been proposed to detect these attacks does not deal with the attacks that are confined to the router
and mitigate the consequent loss by guiding the control units of
the corresponding buffers to either isolate or mask the attacked microarchitecture. They also have proposed a target-activated
buffers in runtime. Area and power overheads of the proposed sequential payload (TASP) HT model that injects faults into
secure router are found to be a maximum of 1.69% and 0.63% the packets, by inspecting them [8]. To circumvent the threats,
respectively when compared to a baseline router in a 16×16 the authors have proposed a heuristic threat detection model
Mesh network. The proposed secure router can also improve to classify faults and to discover the HTs within compromised
the normalized execution time as well as energy consumption of
benchmark applications under considered IPRAs. links. Many of the works reported earlier consider the attack
Index Terms—Allocator, buffer, hardware Trojan, Network-on- scenario while a core is communicating with others. However,
Chip, security. the case of attacking a NoC via a router while the cores remain
I. I NTRODUCTION
idle, has not been considered so far. Unlike the previous works,
With the increase in the heterogeneous functionality pro- this work concentrates on the attack that happens at the buffer
vided by modern electronic systems, several IPs from different sites of a router, when the core attached to it remains idle.
vendors are being integrated to realize such systems. In this In an MPSoC platform, the processing cores remain idle
direction, even the Networks-on-Chip (NoCs) are available as for some time during the execution of a mapped application.
individual IPs, easing the task of designers for performing de- For this idle time, cores do not inject any packet into the
tailed interconnection on the chip. This encourages the attack- network. During this time, the buffer corresponding to the
ers to disrupt the functionality of the chip through malicious core in the associated router should not request the switch
means. Denial-of-Service (DoS) attacks aid in degrading the allocator for any access of the path. Hardware Trojans, which
performance of NoCs and may even create deadlocks, either by perform DoS attacks, can choose this period of application
occupying the hardware resources or by misguiding the flow of execution to generate and send illegal packet requests to the
legal packets. Insertion of hardware Trojans (HTs) into a chip switch allocator. To the best of the authors’ knowledge, illegal
has become a common practice to perform such DoS attacks packet request attack (IPRA), when a core is idle, has not been
[1], [2]. Although Quality-of-Service (QoS) mechanisms exist proposed in the existing literature.
at software or task level, as in [3], [4], to improve the metrics This paper proposes a secure router architecture, called
of legal packet flow, they can also be vulnerable to DoS attacks SeRA, to protect a compromised NoC from HTs deployed at
generated by the HTs. the buffer sites in the router, generating IPRAs. SeRA has been
On the other hand, secure NoC design has been an active endowed with a security unit (SU), which has been proposed
research area for over a decade [5], [6]. Few works targeting to mitigate the IPRAs in runtime.
secure router design for NoCs have been proposed in the Rest of the paper is organized as follows. Section II presents
literature [1], [2], [7]. Ancajas et al. [1] have proposed the motivation and describes the attack scenario. Section III
Fort-NoCs to protect a compromised NoC (C-NoC) in an describes the proposed security unit and router architecture for
MPSoC platform. The threats considered here are related SeRA. Section IV presents the performance evaluation results.
to covert backdoor activation of hardware trojans (HTs) to Section V concludes the article.
snoop the ongoing data communication. However, it does not
II. M OTIVATION AND ATTACK S CENARIO
consider the HTs that can be triggered when there is no data
communication. Biswas et al. [7] have addressed attacks on A. Motivation and Threat Relevance
routing tables, namely, unauthorized access attack and mis- Table I shows the average idle times of cores while run-
routing attack. They have proposed different monitoring-based ning SPLASH-2 [9] benchmark applications on a 64 core
countermeasures against such attacks. Though the presented NoC-based MPSoC. This offers a potential advantage to the
countermeasures are effective in determining the location and attackers, to increase the network congestion by injecting
4 VCs/port 4 VCs/port
Number of Additional Gates
4 8 VCs/port
Src[0] 8 VCs/port
3
8 VCs/port
P VLD 400
2.5
3
Dst[1] 2
.. .. 2
Input Buffer Crossbar 200
Dst[0] . .
1.5 1
FId[0]
I OUT Routing Unit
Number of Nodes Number of Nodes Number of Nodes
Baseline with Threats 1.6 Baseline with Threats [14] I. Seitanidis et al., “Elastistore: Flexible elastic buffering for virtual-
Normalized Execution Time
1.3
SeRA with Threats SeRA with Threats
channel-based networks on chip,” TVLSI, vol. 23, no. 12, pp. 3015–3028,
1.4
Dec 2015.
1.2
[15] M. Oveis-Gharan and G. N. Khan, “Efficient dynamic virtual channel
organization and architecture for noc systems,” TVLSI, vol. 24, no. 2,
1.1 1.2 pp. 465–478, Feb 2016.
[16] T. E. Carlson et al., “An evaluation of high-level mechanistic core
1 1 models,” TACO, vol. 11, no. 3, pp. 28:1–28:23, Oct 2014.
[17] N. Jiang et al., “A detailed and flexible cycle-accurate network-on-chip
e
e
ce
ce
ky
s
x
m
es
x
m
ag
ag
sk
e
di
di
ra
fm
ra
rn
fm
rn
es
er
er
e
ra
ra
yt
yt
ba
ba
ol
ol
av
av
ra
ra
ch
ch
Application Traffic from SPLASH-2 Benchmarks Application Traffic from SPLASH-2 Benchmarks