TY - GEN
T1 - Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task scheduling
AU - Liu, Chen
AU - Rajendran, Jeyavijayan
AU - Yang, Chengmo
AU - Karri, Ramesh
PY - 2013
Y1 - 2013
N2 - Outsourcing of the various aspects of IC design and fabrication flow strongly questions the classic assumption that 'hardware is trustworthy'. Multiprocessor System-on-Chip (MPSoC) platforms face some of the most demanding security concerns, as they process, store, and communicate sensitive information using third-party intellectual property (3PIP) cores that may be untrustworthy. The complexity of an MPSoC makes it expensive and time consuming to fully analyze and test it during the design stage. Consequently, the trustworthiness of the 3PIP components cannot be ensured. To protect MPSoCs against malicious modifications, we propose to incorporate trojan toleration into MPSoC platforms by revising the task scheduling step of the MPSoC design process. We impose a set of security-driven diversity constraints into the scheduling process, enabling the system to detect the presence of malicious modifications or to mute their effects during application execution. Furthermore, we pose the security-constrained MPSoC task scheduling as a multi-dimensional optimization problem, and propose a set of heuristics to ensure that the introduced security constraints can be fulfilled with minimum performance and hardware overhead.
AB - Outsourcing of the various aspects of IC design and fabrication flow strongly questions the classic assumption that 'hardware is trustworthy'. Multiprocessor System-on-Chip (MPSoC) platforms face some of the most demanding security concerns, as they process, store, and communicate sensitive information using third-party intellectual property (3PIP) cores that may be untrustworthy. The complexity of an MPSoC makes it expensive and time consuming to fully analyze and test it during the design stage. Consequently, the trustworthiness of the 3PIP components cannot be ensured. To protect MPSoCs against malicious modifications, we propose to incorporate trojan toleration into MPSoC platforms by revising the task scheduling step of the MPSoC design process. We impose a set of security-driven diversity constraints into the scheduling process, enabling the system to detect the presence of malicious modifications or to mute their effects during application execution. Furthermore, we pose the security-constrained MPSoC task scheduling as a multi-dimensional optimization problem, and propose a set of heuristics to ensure that the introduced security constraints can be fulfilled with minimum performance and hardware overhead.
KW - Hardware Trojan
KW - Heterogeneous MPSoCs
KW - Multi-dimension Optimization
KW - Security
KW - Task Scheduling
UR - http://www.scopus.com/inward/record.url?scp=84891287503&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84891287503&partnerID=8YFLogxK
U2 - 10.1109/DFT.2013.6653590
DO - 10.1109/DFT.2013.6653590
M3 - Conference contribution
AN - SCOPUS:84891287503
SN - 9781479915835
T3 - Proceedings - IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems
SP - 101
EP - 106
BT - Proceedings of the 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2013
T2 - 2013 26th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2013
Y2 - 2 October 2013 through 4 October 2013
ER -