Hardware Trojan Attacks in SoC and NoC

2018 
Over the last decade, a tremendous amount of time, effort, and money has been dedicated to the design of secure and reliable computing hardware. However, the changing electronic design landscape has brought forth unique challenges to system security. The evolution of complex system on chip has pushed for a rapid adoption of horizontal integration strategy, where pre-verified third-party modular IP blocks from multiple vendors from around the world are integrated onto a single substrate. Key to this IP integration is the network-on-chip interconnection fabric that aids seamless communications among these diverse blocks. This chapter studies the emerging Trojan attacks and security techniques employed in system-on-chip security, with a special emphasis on hardware Trojans in the NoC.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    24
    References
    4
    Citations
    NaN
    KQI
    []