Timing attack on NoC-based systems: Prime+Probe attack and NoC-based protection

Many authors have shown how to break the AES cryptographic algorithm with side channel attacks; specially the timing attacks oriented to caches, like Prime+Probe. In this paper, we present two practical timing attacks on NoC that improve Prime+Probe technique, the P+P Firecracker, and P+P Arrow. Our...

Full description

Saved in:
Bibliographic Details
Published inMicroprocessors and microsystems Vol. 52; pp. 556 - 565
Main Authors Reinbrecht, Cezar, Susin, Altamiro, Bossuet, Lilian, Sigl, Georg, Sepúlveda, Johanna
Format Journal Article
LanguageEnglish
Published Kidlington Elsevier B.V 01.07.2017
Elsevier BV
Elsevier
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Many authors have shown how to break the AES cryptographic algorithm with side channel attacks; specially the timing attacks oriented to caches, like Prime+Probe. In this paper, we present two practical timing attacks on NoC that improve Prime+Probe technique, the P+P Firecracker, and P+P Arrow. Our attacks target the communication between an ARM Cortex-A9 core and a shared cache memory. Furthermore, we evaluate a secure enhanced NoC as a countermeasure against the timing attack. Finally, we demonstrate that attacks on MPSoCs through the NoC are a real threat and need to be further explored.
ISSN:0141-9331
1872-9436
DOI:10.1016/j.micpro.2016.12.010