Exportação concluída — 

A probing approach for hardware trojan localization in noc-based manycores

Detalhes bibliográficos
Ano de defesa: 2025
Autor(a) principal: Rodrigues, Gustavo Comaru
Orientador(a): Não Informado pela instituição
Banca de defesa: Não Informado pela instituição
Tipo de documento: Dissertação
Tipo de acesso: Acesso aberto
Idioma: eng
Instituição de defesa: Pontifícia Universidade Católica do Rio Grande do Sul
Escola Politécnica
Brasil
PUCRS
Programa de Pós-Graduação em Ciência da Computação
Programa de Pós-Graduação: Não Informado pela instituição
Departamento: Não Informado pela instituição
País: Não Informado pela instituição
Palavras-chave em Português:
Link de acesso: https://tede2.pucrs.br/tede2/handle/tede/11635
Resumo: As the adoption and complexity of manycore systems increase, ensuring data protection has become a critical design requirement. Additionally, the widespread use of third-party intellectual property cores (3PIPs) to meet time-to-market constraints and reduce design costs, raises the risk of malicious hardware insertion through Hardware Trojans (HTs), thereby increasing the vulnerability of manycore platforms. The Network on-Chip (NoC), due to its central role in the architecture, becomes an attractive target for HT insertion, as it provides access to all other system components. An HT infecting the NoC can enable various attacks, such as denial-of-service (DoS) and performance degradation. When such attacks are detected, the system must deploy countermeasures to halt the attack and protect running applications. However, not knowing the HT´s location reduces the effectiveness of countermeasures. Although the literature offers techniques for identifying the source of attacks in NoCs, these typically require additional security features integrated into NoC hardware, rendering them unsuitable for non-secure 3PIP-based NoCs. This dissertation aims to develop a non-invasive method for localizing HT-infected links in the NoC to address the limitation of adding hardware to non-secure modules. This work introduces a three-phase security framework executing the following actions: (1) monitors inter-task communication to detect HT attacks; (2) employs a localization algorithm to identify the infected links within the NoC; and (3) applies countermeasures to neutralize or mitigate the effects of the attack. The HT localization algorithm uses a technique called path probing, which transmits probe packets along specific NoC paths to evaluate the link integrity. The algorithm selectively sends probes and analyzes their outcomes, refining the search with each result until the HT is accurately localized. The method is implemented in software, allowing HT localization without modifying the NoC hardware. To validate the proposed approach, we conducted a series of attack campaigns in which HTs attacked the manycore using different activation patterns. The results demonstrate that the security framework successfully identified the location of the HTs while incurring minimal impact on system performance.
id P_RS_ad3fc462a7032a755ba8dac4280669fd
oai_identifier_str oai:tede2.pucrs.br:tede/11635
network_acronym_str P_RS
network_name_str Biblioteca Digital de Teses e Dissertações da PUC_RS
repository_id_str
spelling A probing approach for hardware trojan localization in noc-based manycoresNoC-Based ManycoresSecurityHardware Trojan (HT)HT LocalizationCIENCIA DA COMPUTACAO::TEORIA DA COMPUTACAOAs the adoption and complexity of manycore systems increase, ensuring data protection has become a critical design requirement. Additionally, the widespread use of third-party intellectual property cores (3PIPs) to meet time-to-market constraints and reduce design costs, raises the risk of malicious hardware insertion through Hardware Trojans (HTs), thereby increasing the vulnerability of manycore platforms. The Network on-Chip (NoC), due to its central role in the architecture, becomes an attractive target for HT insertion, as it provides access to all other system components. An HT infecting the NoC can enable various attacks, such as denial-of-service (DoS) and performance degradation. When such attacks are detected, the system must deploy countermeasures to halt the attack and protect running applications. However, not knowing the HT´s location reduces the effectiveness of countermeasures. Although the literature offers techniques for identifying the source of attacks in NoCs, these typically require additional security features integrated into NoC hardware, rendering them unsuitable for non-secure 3PIP-based NoCs. This dissertation aims to develop a non-invasive method for localizing HT-infected links in the NoC to address the limitation of adding hardware to non-secure modules. This work introduces a three-phase security framework executing the following actions: (1) monitors inter-task communication to detect HT attacks; (2) employs a localization algorithm to identify the infected links within the NoC; and (3) applies countermeasures to neutralize or mitigate the effects of the attack. The HT localization algorithm uses a technique called path probing, which transmits probe packets along specific NoC paths to evaluate the link integrity. The algorithm selectively sends probes and analyzes their outcomes, refining the search with each result until the HT is accurately localized. The method is implemented in software, allowing HT localization without modifying the NoC hardware. To validate the proposed approach, we conducted a series of attack campaigns in which HTs attacked the manycore using different activation patterns. The results demonstrate that the security framework successfully identified the location of the HTs while incurring minimal impact on system performance.À medida que a adoção e a complexidade de sistemas manycore aumentam, garantir a proteção de dados tornou-se um requisito crítico de projeto. Além disso, o uso generalizado de núcleos de propriedade intelectual de terceiros (3PIPs) para atender às restrições de tempo de lançamento no mercado e reduzir os custos de projeto aumenta o risco de inserção de hardware malicioso por meio de Trojans de Hardware (HTs), aumentando assim a vulnerabilidade das plataformas manycore. A rede intra-chip (NoC), devido ao seu papel central na arquitetura, torna-se um alvo atraente para inserção de HTs, pois fornece acesso a todos os outros componentes do sistema. Um HT infectando a NoC pode permitir vários ataques, como negação de serviço (DoS) e degradação de desempenho. Quando tais ataques são detectados, o sistema deve implementar contramedidas para interromper o ataque e proteger as aplicações em execução. No entanto, desconhecer a localização do HT reduz a eficácia das contramedidas. Embora a literatura ofereça técnicas para identificar a origem de ataques em NoCs, estas normalmente requerem recursos de segurança adicionais integrados ao hardware da NoC, tornando-os inadequados para NoCs baseadas em 3PIP não seguros. Esta dissertação tem por objetivo desenvolver um método não invasivo para localizar links infectados por HTs, a fim de abordar a limitação de adicionar hardware a módulos não seguros. Este trabalho apresenta uma estrutura de segurança em três fases que executam as seguintes ações: (1) monitora a comunicação entre tarefas para detectar ataques de HT; (2) emprega um algoritmo de localização para identificar os links infectados dentro da NoC; e (3) aplica contramedidas para neutralizar ou mitigar os efeitos do ataque. O algoritmo de localização de HT utiliza uma técnica chamada path probing, que transmite pacotes de sondagem ao longo de caminhos específicos da NoC para avaliar a integridade do link. O algoritmo envia sondagens seletivamente e analisa seus resultados, refinando a busca a cada resultado até que o HT seja localizado com precisão. O método é implementado em software, permitindo a localização de HTs sem modificar o hardware da NoC. Para validar a abordagem proposta, conduzimos uma série de campanhas de ataque nas quais HTs atacaram o manycore usando diferentes padrões de ativação. Os resultados demonstram que a estrutura de segurança identificou com sucesso a localização dos HTs, causando impacto mínimo no desempenho do sistema.Conselho Nacional de Pesquisa e Desenvolvimento Científico e Tecnológico - CNPqPontifícia Universidade Católica do Rio Grande do SulEscola PolitécnicaBrasilPUCRSPrograma de Pós-Graduação em Ciência da ComputaçãoMoraes, Fernando Gehmhttp://lattes.cnpq.br/2509301929350826Rodrigues, Gustavo Comaru2025-05-28T11:40:45Z2025-04-29info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesisapplication/pdfhttps://tede2.pucrs.br/tede2/handle/tede/11635enginfo:eu-repo/semantics/openAccessreponame:Biblioteca Digital de Teses e Dissertações da PUC_RSinstname:Pontifícia Universidade Católica do Rio Grande do Sul (PUCRS)instacron:PUC_RS2025-05-28T15:01:38Zoai:tede2.pucrs.br:tede/11635Biblioteca Digital de Teses e Dissertaçõeshttp://tede2.pucrs.br/tede2/PRIhttps://tede2.pucrs.br/oai/requestbiblioteca.central@pucrs.br||opendoar:2025-05-28T15:01:38Biblioteca Digital de Teses e Dissertações da PUC_RS - Pontifícia Universidade Católica do Rio Grande do Sul (PUCRS)false
dc.title.none.fl_str_mv A probing approach for hardware trojan localization in noc-based manycores
title A probing approach for hardware trojan localization in noc-based manycores
spellingShingle A probing approach for hardware trojan localization in noc-based manycores
Rodrigues, Gustavo Comaru
NoC-Based Manycores
Security
Hardware Trojan (HT)
HT Localization
CIENCIA DA COMPUTACAO::TEORIA DA COMPUTACAO
title_short A probing approach for hardware trojan localization in noc-based manycores
title_full A probing approach for hardware trojan localization in noc-based manycores
title_fullStr A probing approach for hardware trojan localization in noc-based manycores
title_full_unstemmed A probing approach for hardware trojan localization in noc-based manycores
title_sort A probing approach for hardware trojan localization in noc-based manycores
author Rodrigues, Gustavo Comaru
author_facet Rodrigues, Gustavo Comaru
author_role author
dc.contributor.none.fl_str_mv Moraes, Fernando Gehm
http://lattes.cnpq.br/2509301929350826
dc.contributor.author.fl_str_mv Rodrigues, Gustavo Comaru
dc.subject.por.fl_str_mv NoC-Based Manycores
Security
Hardware Trojan (HT)
HT Localization
CIENCIA DA COMPUTACAO::TEORIA DA COMPUTACAO
topic NoC-Based Manycores
Security
Hardware Trojan (HT)
HT Localization
CIENCIA DA COMPUTACAO::TEORIA DA COMPUTACAO
description As the adoption and complexity of manycore systems increase, ensuring data protection has become a critical design requirement. Additionally, the widespread use of third-party intellectual property cores (3PIPs) to meet time-to-market constraints and reduce design costs, raises the risk of malicious hardware insertion through Hardware Trojans (HTs), thereby increasing the vulnerability of manycore platforms. The Network on-Chip (NoC), due to its central role in the architecture, becomes an attractive target for HT insertion, as it provides access to all other system components. An HT infecting the NoC can enable various attacks, such as denial-of-service (DoS) and performance degradation. When such attacks are detected, the system must deploy countermeasures to halt the attack and protect running applications. However, not knowing the HT´s location reduces the effectiveness of countermeasures. Although the literature offers techniques for identifying the source of attacks in NoCs, these typically require additional security features integrated into NoC hardware, rendering them unsuitable for non-secure 3PIP-based NoCs. This dissertation aims to develop a non-invasive method for localizing HT-infected links in the NoC to address the limitation of adding hardware to non-secure modules. This work introduces a three-phase security framework executing the following actions: (1) monitors inter-task communication to detect HT attacks; (2) employs a localization algorithm to identify the infected links within the NoC; and (3) applies countermeasures to neutralize or mitigate the effects of the attack. The HT localization algorithm uses a technique called path probing, which transmits probe packets along specific NoC paths to evaluate the link integrity. The algorithm selectively sends probes and analyzes their outcomes, refining the search with each result until the HT is accurately localized. The method is implemented in software, allowing HT localization without modifying the NoC hardware. To validate the proposed approach, we conducted a series of attack campaigns in which HTs attacked the manycore using different activation patterns. The results demonstrate that the security framework successfully identified the location of the HTs while incurring minimal impact on system performance.
publishDate 2025
dc.date.none.fl_str_mv 2025-05-28T11:40:45Z
2025-04-29
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/masterThesis
format masterThesis
status_str publishedVersion
dc.identifier.uri.fl_str_mv https://tede2.pucrs.br/tede2/handle/tede/11635
url https://tede2.pucrs.br/tede2/handle/tede/11635
dc.language.iso.fl_str_mv eng
language eng
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Pontifícia Universidade Católica do Rio Grande do Sul
Escola Politécnica
Brasil
PUCRS
Programa de Pós-Graduação em Ciência da Computação
publisher.none.fl_str_mv Pontifícia Universidade Católica do Rio Grande do Sul
Escola Politécnica
Brasil
PUCRS
Programa de Pós-Graduação em Ciência da Computação
dc.source.none.fl_str_mv reponame:Biblioteca Digital de Teses e Dissertações da PUC_RS
instname:Pontifícia Universidade Católica do Rio Grande do Sul (PUCRS)
instacron:PUC_RS
instname_str Pontifícia Universidade Católica do Rio Grande do Sul (PUCRS)
instacron_str PUC_RS
institution PUC_RS
reponame_str Biblioteca Digital de Teses e Dissertações da PUC_RS
collection Biblioteca Digital de Teses e Dissertações da PUC_RS
repository.name.fl_str_mv Biblioteca Digital de Teses e Dissertações da PUC_RS - Pontifícia Universidade Católica do Rio Grande do Sul (PUCRS)
repository.mail.fl_str_mv biblioteca.central@pucrs.br||
_version_ 1850041319454408704