DocumentCode :
2052310
Title :
Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task scheduling
Author :
Chen Liu ; Rajendran, Jeyavijayan ; Chengmo Yang ; Karri, Ramesh
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Delaware, Newark, DE, USA
fYear :
2013
fDate :
2-4 Oct. 2013
Firstpage :
101
Lastpage :
106
Abstract :
Outsourcing of the various aspects of IC design and fabrication flow strongly questions the classic assumption that “hardware is trustworthy”. Multiprocessor System-on-Chip (MPSoC) platforms face some of the most demanding security concerns, as they process, store, and communicate sensitive information using third-party intellectual property (3PIP) cores that may be untrustworthy. The complexity of an MPSoC makes it expensive and time consuming to fully analyze and test it during the design stage. Consequently, the trustworthiness of the 3PIP components cannot be ensured. To protect MPSoCs against malicious modifications, we propose to incorporate trojan toleration into MPSoC platforms by revising the task scheduling step of the MPSoC design process. We impose a set of security-driven diversity constraints into the scheduling process, enabling the system to detect the presence of malicious modifications or to mute their effects during application execution. Furthermore, we pose the security-constrained MPSoC task scheduling as a multi-dimensional optimization problem, and propose a set of heuristics to ensure that the introduced security constraints can be fulfilled with minimum performance and hardware overhead.
Keywords :
integrated circuit design; invasive software; multiprocessing systems; processor scheduling; system-on-chip; 3PIP components; 3PIP cores; IC design; IC fabrication flow; MPSoC design process; MPSoC platforms; design stage; malicious modifications; multidimensional optimization problem; multiprocessor system-on-chip platforms; outsourcing; scheduling process; security constraints; security-constrained MPSoC task scheduling; security-driven diversity constraints; security-driven task scheduling; shielding heterogeneous MPSoC; third-party intellectual property core; trojan toleration; untrustworthy 3PIP; Complexity theory; Discrete Fourier transforms; Fault tolerance; Fault tolerant systems; Size measurement; Trojan horses; Hardware Trojan; Heterogeneous MPSoCs; Multi-dimension Optimization; Security; Task Scheduling;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), 2013 IEEE International Symposium on
Conference_Location :
New York City, NY
ISSN :
1550-5774
Print_ISBN :
978-1-4799-1583-5
Type :
conf
DOI :
10.1109/DFT.2013.6653590
Filename :
6653590
Link To Document :
بازگشت