Trustworthy computing on untrustworthy and Trojan-infected on-chip interconnects

Heba Salem, Nigel Topham

Research output: Chapter in Book/Report/Conference proceedingConference contribution


This paper introduces a scheme for achieving trustworthy computing on SoCs that use an outsourced AXI inter-connect for on-chip communication. This is achieved through component guarding, data tagging, event verification, and consequently responding dynamically to an attack. Experimental results confirm the ability of the proposed scheme to detect HT attacks and respond to them at run-time. The proposed scheme extends the state-of-art in trustworthy computing on untrustworthy components by focusing on the issue of an untrusted on-chip interconnect for the first time, and by developing a scheme that is independent of untrusted third-party IP.
Original languageEnglish
Title of host publicationProceedings of the 26th IEEE European Test Symposium
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages2
ISBN (Electronic)978-1-6654-1849-2
ISBN (Print)978-1-6654-4819-2
Publication statusPublished - 29 Jun 2021
Event26th IEEE European Test Symposium - Virtual, Belgium
Duration: 24 May 202128 May 2021

Publication series

ISSN (Print)1530-1877
ISSN (Electronic)1558-1780


Symposium26th IEEE European Test Symposium
Abbreviated titleETS 2021
Internet address


  • Hardware Trust
  • Hardware Security
  • Design for Security


Dive into the research topics of 'Trustworthy computing on untrustworthy and Trojan-infected on-chip interconnects'. Together they form a unique fingerprint.

Cite this