S4oC: A Self-optimizing, Self-adapting Secure System-on-Chip Design Framework to Tackle Unknown Threats – A Network Theoretic, Learning Approach

04/05/2020
by   Shahin Nazarian, et al.
0

We propose a framework for the design and optimization of a secure self-optimizing, self-adapting system-on-chip (S4oC) architecture. The goal is to minimize the impact of attacks such as hardware Trojan and side-channel, by making real-time adjustments. S4oC learns to reconfigure itself, subject to various security measures and attacks, some of which possibly unknown at design time. Furthermore, the data types and patterns of the target applications, environmental conditions, and sources of variations are incorporated. S4oC is a manycore system, modeled as a four-layer graph, representing the model of computation (MoCp), model of connection (MoCn), model of memory (MoM) and model of storage (MoS), with a large number of elements including heterogeneous reconfigurable processing elements in MoCp, and memory elements in the MoM layer. Security driven community detection, and neural networks are utilized for application task clustering, and distributed reinforcement learning (RL) for task mapping.

READ FULL TEXT
research
08/30/2021

Security For System-On-Chip (SoC) Using Neural Networks

With the growth of embedded systems, VLSI design phases complexity and c...
research
07/14/2020

Optimizing Memory Placement using Evolutionary Graph Reinforcement Learning

As modern neural networks have grown to billions of parameters, meeting ...
research
07/20/2020

Exploiting Process Variations to Secure Photonic NoC Architectures from Snooping Attacks

The compact size and high wavelength-selectivity of microring resonators...
research
08/29/2022

Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges

Reinforcement learning (RL) is a machine learning paradigm where an auto...
research
10/23/2020

Learning Assisted Side Channel Delay Test for Detection of Recycled ICs

With the outsourcing of design flow, ensuring the security and trustwort...
research
08/09/2023

IoT Security: On-Chip Secure Deletion Scheme using ECC Modulation in IoT Appliances

NAND flash memory-based IoT devices inherently suffer from data retentio...
research
03/12/2021

System Component-Level Self-Adaptations for Security via Bayesian Games

Security attacks present unique challenges to self-adaptive system desig...

Please sign up or login with your details

Forgot password? Click here to reset