Exploiting Process Variations to Secure Photonic NoC Architectures from Snooping Attacks

07/20/2020
by   Sai Vineel Reddy Chittamuru, et al.
0

The compact size and high wavelength-selectivity of microring resonators (MRs) enable photonic networks-on-chip (PNoCs) to utilize dense-wavelength-division-multiplexing (DWDM) in their photonic waveguides, and as a result, attain high bandwidth on-chip data transfers. Unfortunately, a Hardware Trojan in a PNoC can manipulate the electrical driving circuit of its MRs to cause the MRs to snoop data from the neighboring wavelength channels in a shared photonic waveguide, which introduces a serious security threat. This paper presents a framework that utilizes process variation-based authentication signatures along with architecture-level enhancements to protect against data-snooping Hardware Trojans during unicast as well as multicast transfers in PNoCs. Evaluation results indicate that our framework can improve hardware security across various PNoC architectures with minimal overheads of up to 14.2

READ FULL TEXT

Authors

page 12

page 13

04/28/2020

A Low-Power Dual-Factor Authentication Unit for Secure Implantable Devices

This paper presents a dual-factor authentication protocol and its low-po...
12/10/2021

Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation

Modern mobile devices feature multiple wireless technologies, such as Bl...
09/03/2021

A Novel IoT Sensor Authentication Using HaLo Extraction Method and Memory Chip Variability

In this paper, we propose flash-based hardware security primitives as a ...
09/14/2019

PUFchain: Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE)

This article presents the first-ever blockchain which can simultaneously...
10/19/2021

Holistic Hardware Security Assessment Framework: A Microarchitectural Perspective

Our goal is to enable holistic hardware security evaluation from the mic...
06/20/2019

Defensive Routing: a Preventive Layout-Level Defense Against Untrusted Foundries

Since the inception of the integrated circuit (IC), the size of the tran...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.