Please use this identifier to cite or link to this item:
http://dspace.iitrpr.ac.in:8080/xmlui/handle/123456789/4098
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bisht, B. | - |
dc.contributor.author | Das, S. | - |
dc.date.accessioned | 2022-10-23T15:55:04Z | - |
dc.date.available | 2022-10-23T15:55:04Z | - |
dc.date.issued | 2022-10-23 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/4098 | - |
dc.description.abstract | Due to the cost and complexity of current multicore CPUs, chipmakers rely heavily on third-party IPs. A hostile IP or hardware Trojan (HT) on the Network-on-Chip (NoC) can degrade or leak packets. Several ways to identify HT in NoCs have been presented, but they are not robust. In this work, we propose the Blaming Hardware Trojan (BHT), which causes false positive HTs by exploiting current security features to decrease system performance. The proposed BHT attack can reduce affected router performance by 36.39%, and overall performance by 9.79%. The proposed countermeasure can recover it by losing only 2.6% performance. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Network on Chip | en_US |
dc.subject | Security | en_US |
dc.subject | Threat | en_US |
dc.subject | Attacks | en_US |
dc.title | BHT-NoC: Blaming Hardware Trojans in NoC Routers | en_US |
dc.type | Article | en_US |
Appears in Collections: | Year-2022 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Full Text.pdf | 534.02 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.