Zhang, L and Wang, X and Jiang, Y and Yang, M and Mak, T and Singh, AK (2018) Effectiveness of HT-assisted Sinkhole and Blackhole Denial of Service Attacks Targeting Mesh Networks-on-chip. Journal of Systems Architecture, 89. pp. 84-94. DOI https://doi.org/10.1016/j.sysarc.2018.07.005
Zhang, L and Wang, X and Jiang, Y and Yang, M and Mak, T and Singh, AK (2018) Effectiveness of HT-assisted Sinkhole and Blackhole Denial of Service Attacks Targeting Mesh Networks-on-chip. Journal of Systems Architecture, 89. pp. 84-94. DOI https://doi.org/10.1016/j.sysarc.2018.07.005
Zhang, L and Wang, X and Jiang, Y and Yang, M and Mak, T and Singh, AK (2018) Effectiveness of HT-assisted Sinkhole and Blackhole Denial of Service Attacks Targeting Mesh Networks-on-chip. Journal of Systems Architecture, 89. pp. 84-94. DOI https://doi.org/10.1016/j.sysarc.2018.07.005
Abstract
There are ample opportunities at both design and manufacturing phases to meddle in a many-core chip system, especially its underlining communication fabric, known as the networks-on-chip (NoC), through the inclusion of malicious hardware Trojans (HT). In this paper, we focus on studying two specific HT-assisted Denial-of-Service (DoS) attacks, namely the sinkhole and blackhole attacks, that directly target the NoC of a many-core chip. As of the blackhole attacks, those intermediate routers with inserted HTs can stop forwarding data packets/flits towards the packets’ destination; instead, packets are either dropped from the network or diverted to some other malicious nodes. Sinkhole attacks, which exhibit similar attack effects as blackhole attacks, can occur when the NoC supports adaptive routing. In this case, a malicious node actively solicits packets from its neighbor nodes by pretending to have sufficient free buffer slots. Effects and efficiencies of both sinkhole and blackhole DoS attacks are modeled and quantified in this paper, and a few factors that influence attack effects are found to be critical. Through fine-tuning of these parameters, both attacks are shown to cause more damages to the NoC, measured as over 30% increase in packet loss rate. Even with current detection and defense methods in place, the packet loss rate is still remarkably high, suggesting the need of new and more effective detection and defense methods against the enhanced blackhole and sinkhole attacks as described in the paper.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | networks-on-chip; hardware Trojan; denial-of-service attack |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 06 Aug 2018 09:45 |
Last Modified: | 23 Sep 2022 19:25 |
URI: | http://repository.essex.ac.uk/id/eprint/22785 |
Available files
Filename: 1s20S1383762118300675main.pdf
Licence: Creative Commons: Attribution-Noncommercial-No Derivative Works 3.0