dc.contributor.advisor | Nandy, S K | |
dc.contributor.author | Biswas, Arnab Kumar | |
dc.date.accessioned | 2016-09-08T07:08:11Z | |
dc.date.accessioned | 2018-07-31T04:34:34Z | |
dc.date.available | 2016-09-08T07:08:11Z | |
dc.date.available | 2018-07-31T04:34:34Z | |
dc.date.issued | 2016 | |
dc.date.submitted | 2016 | |
dc.identifier.uri | https://etd.iisc.ac.in/handle/2005/2554 | |
dc.identifier.abstract | http://etd.iisc.ac.in/static/etd/abstracts/3321/Arnab-Abs.pdf | en_US |
dc.description.abstract | With Multiprocessor Systems-on-Chips (MPSoCs) pervading our lives, security issues are emerging as a serious problem and attacks against these systems are becoming more critical and sophisticated. We have designed and implemented different hardware based solutions to ensure security of an MPSoC. Security assisting modules can be implemented at different abstraction
levels of an MPSoC design. We propose solutions both at circuit level and system level of abstractions. At the VLSI circuit level abstraction, we consider the problem of presence of noise voltage in input signal coming from outside world. This noise voltage disturbs the normal circuit operation inside a chip causing false logic reception. If the disturbance is caused
intentionally the security of a chip may be compromised causing glitch/transient attack. We propose an input receiver with hysteresis characteristic that can work at voltage levels between 0.9V and 5V. The circuit can protect the MPSoC from glitch/transient attack. At the system level, we propose solutions targeting Network-on-Chip (NoC) as the on-chip communication medium. We survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC enabled MPSoC. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple Trusted Execution Environments (TEEs). Software attacks, the most common type of attacks, mainly exploit vulnerabilities like buffer overflow. This is possible if proper access control to memory is absent in the system. We propose four hardware based mechanisms to implement Role Based Access Control (RBAC) model in NoC based MPSoC. | en_US |
dc.description.sponsorship | MHRD PhD scholarship | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Network-on-Chip (NoC) | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Multiprocessor Systems-on-Chips (MPSoCs) | en_US |
dc.subject | MP-SoC | en_US |
dc.subject | Role Based Access Control (RBAC) | en_US |
dc.subject | Role Based Shared Memory Access Control | en_US |
dc.subject | MPSoC | en_US |
dc.subject.classification | Electronics Engineering | en_US |
dc.title | Securing Multiprocessor Systems-on-Chip | en_US |
dc.type | Thesis | en_US |
dc.degree.name | PhD | en_US |
dc.degree.level | Doctoral | en_US |
dc.degree.discipline | Faculty of Engineering | en_US |