Το έργο με τίτλο Security enhancements for building saturation-free, low-power NoC-based MPSoCs από τον/τους δημιουργό/ούς Papadimitriou Kyprianos, Petrakis Polydoros, Grammatikakis Miltos D., Coppola Marcello διατίθεται με την άδεια Creative Commons Αναφορά Δημιουργού 4.0 Διεθνές
Βιβλιογραφική Αναφορά
K. Papadimitriou, P. Petrakis, M. Grammatikakis and M. Coppola, "Security Enhancements for Building Saturation-free, Low-power NoC-based MPSoCs",
in IEEE International Workshop on Security and Privacy in Cybermatics (SPiCy), in conjunction with the IEEE International Conference on Communications and Network Security (CNS), Sep. 2015.
In the future almost every consumer electronicsdevice will be connected to an ecosystem of third-party partnersproviding services such as payment, streaming content, and soon. Present work aims to expose the foundations of a secureenvironment by ensuring security on the edge devices. MPSoCsare widely used in edge devices due to their capability to executemultiple applications in single-chips. To achieve the targetedsecurity level against physical adversaries, all communicationsbetween the MPSoC and its environment must be protected.In an MPSoC multiple processing elements such as CPUssend requests to different on-chip memories. Network-on-chiphas been proposed for MPSoC design, aiming at increasingperformance and reducing power compared to on-chip buses.Tailoring the NoC to application(s) takes place usually at designtime.The selection of NoC parameter values affects both performanceand power, while configuring them unwisely can result inunnecessary area overhead and chip cost. In the present workwe concentrate on a commercial interconnect called STNoC fromSTMicroelectronics. We keep the NoC parameters fixed, and weexplore the effects from the variation of other parameters, such asthe injection rate of the packets transmitted by the CPUs, and theactivation/deactivation of a security mechanism integrated in thenetwork interface of the NoC, for multiple traffic scenarios witheach one representing different amount of legal and maliciousrequests, for different mappings, and for different node setups.Experimental results, reveal the conditions under which the NoCstarts experiencing saturation phenomena.