Apraxia 发表于 2025-3-26 21:02:23
Lightweight Encryption Using Incremental Cryptographylity to all communications in the SoC, it has been one of the primary targets for security attacks. While packet encryption can provide secure communication, it can introduce unacceptable energy and performance overhead due to the resource-constrained nature of SoC designs. In this chapter, we exploSHOCK 发表于 2025-3-27 03:23:42
http://reply.papertrans.cn/67/6630/662912/662912_32.pngOptometrist 发表于 2025-3-27 06:48:39
Lightweight Anonymous Routing for On-chip Interconnectsing SoC complexity, coupled with tight time-to-market deadlines, has led to increased utilization of Intellectual Property (IP) cores from third-party vendors. SoC supply chain is widely acknowledged as a major source of security vulnerabilities. Potentially malicious third-party IPs integrated on tfibula 发表于 2025-3-27 13:05:01
Secure Cryptography Integration: NoC-Based Microarchitectural Attacks and Countermeasuresnd communication is ubiquitous. Security in such environments is a major requirement. In order to cope with the security needs and provide confidentiality and authentication services, MPSoCs usually integrate cryptographic functionalities deployed as software and/or hardware solutions. However, the火花 发表于 2025-3-27 16:31:09
Real-Time Detection and Localization of DoS Attacks complexity coupled with its widespread usage has made it a focal point of potential security attacks. Denial-of-Service (DoS) is one such attack that is caused by malicious intellectual property (IP) cores flooding the network with unnecessary packets causing significant performance degradation thrgospel 发表于 2025-3-27 20:12:36
Securing on-Chip Communication Using Digital Watermarking time-to-market constraints. A typical SoC consists of a wide variety of IP cores (such as processor, memory, controller, FPGA, etc.) that interact using a Network-on-Chip (NoC). This global trend of designing SoCs using third-party IPs raises serious concerns about security vulnerabilities. Since N婴儿 发表于 2025-3-28 00:07:03
Network-on-Chip Attack Detection using Machine Learninge. SoC designers increasingly rely on global supply chains for obtaining third-party IPs. In addition to inherent vulnerabilities associated with utilizing third-party IPs, NoC-based SoCs enable attackers to exploit the distributed nature of NoC and its connectivity with various IPs to launch a plet狼群 发表于 2025-3-28 04:23:17
http://reply.papertrans.cn/67/6630/662912/662912_38.pngModicum 发表于 2025-3-28 09:30:46
Network-on-Chip Security and Trust Verification (SoC). Network-on-Chip (NoC) is a scalable solution to provide communication between a large number of IP cores in modern SoC designs. While SoC design methodology relies on third-party IPs to reduce cost and meet time-to-market constraints, it raises serious security concerns. NoC is an ideal targparallelism 发表于 2025-3-28 13:57:34
NoC Post-Silicon Validation and Debugth the increasing complexity of SoCs. This results in multiple bugs being present on the interconnect module even after the pre-silicon verification stage. Hence, efficient post-silicon debug mechanisms should be employed to detect the skipped bugs and provide an error-free NoC. This chapter highlig