Trustworthy computing on untrustworthy and Trojan-infected on-chip interconnects

Heba Salem, Nigel Topham

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper introduces a scheme for achieving trustworthy computing on SoCs that use an outsourced AXI inter-connect for on-chip communication. This is achieved through component guarding, data tagging, event verification, and consequently responding dynamically to an attack. Experimental results confirm the ability of the proposed scheme to detect HT attacks and respond to them at run-time. The proposed scheme extends the state-of-art in trustworthy computing on untrustworthy components by focusing on the issue of an untrusted on-chip interconnect for the first time, and by developing a scheme that is independent of untrusted third-party IP.
Original languageEnglish
Title of host publicationProceedings of the 26th IEEE European Test Symposium
PublisherInstitute of Electrical and Electronics Engineers
Number of pages2
ISBN (Electronic)978-1-6654-1849-2
ISBN (Print)978-1-6654-4819-2
DOIs
Publication statusPublished - 29 Jun 2021
Event26th IEEE European Test Symposium - Virtual, Belgium
Duration: 24 May 202128 May 2021
https://ets2021.eu/

Publication series

Name
ISSN (Print)1530-1877
ISSN (Electronic)1558-1780

Symposium

Symposium26th IEEE European Test Symposium
Abbreviated titleETS 2021
Country/TerritoryBelgium
Period24/05/2128/05/21
Internet address

Keywords / Materials (for Non-textual outputs)

  • Hardware Trust
  • Hardware Security
  • Design for Security

Fingerprint

Dive into the research topics of 'Trustworthy computing on untrustworthy and Trojan-infected on-chip interconnects'. Together they form a unique fingerprint.

Cite this