Timing attack on NoC-based systems: Prime+Probe attack and NoC-based protection
Many authors have shown how to break the AES cryptographic algorithm with side channel attacks; specially the timing attacks oriented to caches, like Prime+Probe. In this paper, we present two practical timing attacks on NoC that improve Prime+Probe technique, the P+P Firecracker, and P+P Arrow. Our...
Saved in:
Published in | Microprocessors and microsystems Vol. 52; pp. 556 - 565 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Kidlington
Elsevier B.V
01.07.2017
Elsevier BV Elsevier |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Many authors have shown how to break the AES cryptographic algorithm with side channel attacks; specially the timing attacks oriented to caches, like Prime+Probe. In this paper, we present two practical timing attacks on NoC that improve Prime+Probe technique, the P+P Firecracker, and P+P Arrow. Our attacks target the communication between an ARM Cortex-A9 core and a shared cache memory. Furthermore, we evaluate a secure enhanced NoC as a countermeasure against the timing attack. Finally, we demonstrate that attacks on MPSoCs through the NoC are a real threat and need to be further explored. |
---|---|
ISSN: | 0141-9331 1872-9436 |
DOI: | 10.1016/j.micpro.2016.12.010 |