找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Network-on-Chip Security and Privacy; Prabhat Mishra,Subodha Charles Book 2021 The Editor(s) (if applicable) and The Author(s), under excl

[复制链接]
楼主: 凝固
发表于 2025-3-26 21:02:23 | 显示全部楼层
Lightweight Encryption Using Incremental Cryptographylity to all communications in the SoC, it has been one of the primary targets for security attacks. While packet encryption can provide secure communication, it can introduce unacceptable energy and performance overhead due to the resource-constrained nature of SoC designs. In this chapter, we explo
发表于 2025-3-27 03:23:42 | 显示全部楼层
发表于 2025-3-27 06:48:39 | 显示全部楼层
Lightweight Anonymous Routing for On-chip Interconnectsing SoC complexity, coupled with tight time-to-market deadlines, has led to increased utilization of Intellectual Property (IP) cores from third-party vendors. SoC supply chain is widely acknowledged as a major source of security vulnerabilities. Potentially malicious third-party IPs integrated on t
发表于 2025-3-27 13:05:01 | 显示全部楼层
Secure Cryptography Integration: NoC-Based Microarchitectural Attacks and Countermeasuresnd communication is ubiquitous. Security in such environments is a major requirement. In order to cope with the security needs and provide confidentiality and authentication services, MPSoCs usually integrate cryptographic functionalities deployed as software and/or hardware solutions. However, the
发表于 2025-3-27 16:31:09 | 显示全部楼层
Real-Time Detection and Localization of DoS Attacks complexity coupled with its widespread usage has made it a focal point of potential security attacks. Denial-of-Service (DoS) is one such attack that is caused by malicious intellectual property (IP) cores flooding the network with unnecessary packets causing significant performance degradation thr
发表于 2025-3-27 20:12:36 | 显示全部楼层
Securing on-Chip Communication Using Digital Watermarking time-to-market constraints. A typical SoC consists of a wide variety of IP cores (such as processor, memory, controller, FPGA, etc.) that interact using a Network-on-Chip (NoC). This global trend of designing SoCs using third-party IPs raises serious concerns about security vulnerabilities. Since N
发表于 2025-3-28 00:07:03 | 显示全部楼层
Network-on-Chip Attack Detection using Machine Learninge. SoC designers increasingly rely on global supply chains for obtaining third-party IPs. In addition to inherent vulnerabilities associated with utilizing third-party IPs, NoC-based SoCs enable attackers to exploit the distributed nature of NoC and its connectivity with various IPs to launch a plet
发表于 2025-3-28 04:23:17 | 显示全部楼层
发表于 2025-3-28 09:30:46 | 显示全部楼层
Network-on-Chip Security and Trust Verification (SoC). Network-on-Chip (NoC) is a scalable solution to provide communication between a large number of IP cores in modern SoC designs. While SoC design methodology relies on third-party IPs to reduce cost and meet time-to-market constraints, it raises serious security concerns. NoC is an ideal targ
发表于 2025-3-28 13:57:34 | 显示全部楼层
NoC Post-Silicon Validation and Debugth the increasing complexity of SoCs. This results in multiple bugs being present on the interconnect module even after the pre-silicon verification stage. Hence, efficient post-silicon debug mechanisms should be employed to detect the skipped bugs and provide an error-free NoC. This chapter highlig
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-19 01:45
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表