A Survey of Network-on-Chip Security Attacks and Countermeasures

نویسندگان

چکیده

With the advances of chip manufacturing technologies, computer architects have been able to integrate an increasing number processors and other heterogeneous components on same chip. Network-on-Chip (NoC) is widely employed by multicore System-on-Chip (SoC) architectures cater their communication requirements. NoC has received significant attention from both attackers defenders. The increased usage its distributed nature across made it a focal point potential security attacks. Due prime location in SoC coupled with connectivity various components, can be effectively utilized implement countermeasures protect There wide variety existing literature attacks countermeasures. In this article, we provide comprehensive survey vulnerabilities NoC-based discuss relevant

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

Network Coding Security: Attacks and Countermeasures

By allowing intermediate nodes to perform non-trivial operations on packets, such as mixing data from multiple streams, network coding breaks with the ruling store and forward networking paradigm and opens a myriad of challenging security questions. Following a brief overview of emerging network coding protocols, we provide a taxonomy of their security vulnerabilities, which highlights the diff...

متن کامل

Security Attacks and Countermeasures for Wireless Sensor Networks: Survey

The security topic is a conclusive challenge for Wireless Sensor Networks (WSNs) due to the deployment nature and the resources limitations of wireless sensor devices used in such networks. Wireless Sensor Networks are used sometime in very sensitive applications, such as military, airports, and healthcare. Therefore, we must address the security concerns from the beginning of network design. D...

متن کامل

Development of DNS security, attacks and countermeasures

We use the Internet every day. The Internet relies in its very foundations on DNS, the Domain Name System. What most people don’t know is how fragile DNS actually is. This paper discusses the shortcomings of DNS, and how it is being secured. We explain common attacks, such as cache poisoning and DNS forgery. Then we mention some incidents briefly, before moving on the improvements. The improvem...

متن کامل

A survey on security attacks and countermeasures with primary user detection in cognitive radio networks

Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR) emerges as one of the most promising players by enabling the dynamic access to vacant frequency bands on a non-interference basis. However, the intrinsic characteristic of CR opens new w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Computing Surveys

سال: 2021

ISSN: ['0360-0300', '1557-7341']

DOI: https://doi.org/10.1145/3450964