Details
Poster
Presenter(s)
![M Meraj Ahmed Headshot](https://confcats-catavault.s3.amazonaws.com/CATAVault/ieeecass/master/files/styles/cc_user_photo/s3/user-pictures/20811.jpg?h=cf5e4b83&itok=CTHeHQqf)
Display Name
M Meraj Ahmed
- Affiliation
-
AffiliationRochester Institute of Technology
- Country
Abstract
Given the criticality of Networks-on-Chips (NoCs) in multi/many-core systems, their security can be severely subverted if the NoC is compromised. The threat of Hardware Trojans (HTs) penetrating complex hardware systems such as multi/many-core processors are increasing due to the increasing presence of third party players in a System-on-chip (SoC) design. Even by deploying naïve HTs, an adversary can exploit the NoC backbone of the processor and get access to communication patterns in the system. This information, if leaked to an external attacker, can compromise the application suites running on the system orleak architectural Intellectual Property (IP) of the system.