Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Arnab Kumar Biswas"'
Autor:
Arnab Kumar Biswas, Biplab Sikdar
Publikováno v:
ACM Transactions on Embedded Computing Systems. 21:1-21
The theft of Intellectual property (IP) is a serious security threat for all businesses that are involved in the creation of IP. In this article, we consider such attacks against IP for Network-on-Chip (NoC) that are commonly used as a popular on-chi
Autor:
Arnab Kumar Biswas
Publikováno v:
Biswas, A K 2022, ' Using pattern of on-off routers and links and router delays to protect network-on-chip intellectual property ', ACM Transactions on Computer Systems, vol. 40, no. 1-4, 2, pp. 1-19 . https://doi.org/10.1145/3548680
Queen's University Belfast-PURE
Queen's University Belfast-PURE
Intellectual Property (IP) reuse is a well known practice in chip design processes. Nowadays, network-on-chips (NoCs) are increasingly used as IP and sold by various vendors to be integrated in a multiprocessor system-on-chip (MPSoC). However, IP reu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e2611440888f87be15f9581beb8fcf76
https://pure.qub.ac.uk/en/publications/97c07be3-fa6b-4ac2-828e-07952ca343c6
https://pure.qub.ac.uk/en/publications/97c07be3-fa6b-4ac2-828e-07952ca343c6
Autor:
Arnab Kumar Biswas
Publikováno v:
ACM Journal on Emerging Technologies in Computing Systems. 17:1-22
Intellectual property (IP) reuse is a well-known technique in chip design industry. But this technique also exposes a security vulnerability called IP stealing attack. Network-on-Chip (NoC) is an on-chip scalable communication medium and is used as a
Autor:
Arnab Kumar Biswas, Sai Praveen Kadiyala, Yash Shrivastava, Manaar Alam, Sikhar Patranabis, Muhamed Fauzi Bin Abbas, Thambipillai Srikanthan, Debdeep Mukhopadhyay
Publikováno v:
ACM Transactions on Embedded Computing Systems. 19:1-31
Security is a critical aspect in many of the latest embedded and IoT systems. Malware is one of the severe threats of security for such devices. There have been enormous efforts in malware detection and analysis; however, occurrences of newer varieti
Publikováno v:
ACM Transactions on Software Engineering and Methodology. 29:1-31
Spectre-style attacks disclosed in early 2018 expose data leakage scenarios via cache side channels. Specifically, speculatively executed paths due to branch mis-prediction may bring secret data into the cache, which are then exposed via cache side c
Autor:
Arnab Kumar Biswas
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 29:1044-1057
Continuous development of Network-on-Chip (NoC) enables different types of applications to run efficiently in a Multiprocessor System-on-Chip (MP-SoC). Guaranteed service (GS) can be provided by circuit switching NoC and Best effort service (BES) can
Autor:
Arnab Kumar Biswas
Publikováno v:
ACM Journal on Emerging Technologies in Computing Systems. 13:1-31
It is known that maliciously configured Network-on-Chip routers can enable an attacker to launch different attacks inside a Multiprocessor System-on-Chip. A source authentication mechanism for router configuration packets can prevent such vulnerabili
Autor:
Arnab Kumar Biswas, S. K. Nandy
Publikováno v:
Nano Communication Networks. 7:46-64
Security is becoming one of the main aspects of Multiprocessor System-on-Chip (MP-SoC) design. Software attacks, the most common type of attacks, mainly exploit vulnerabilities like buffer overflow. This is possible if proper access control to memory
Publikováno v:
Journal of Vision. 20:484
Autor:
Arnab Kumar Biswas, Guillaume Hiet, Pascal Cotret, Vianney Lapotre, Guy Gogniat, Muhammad Abdul Wahab, Mounir Nasr Allah
Publikováno v:
AsianHOST 2018-Asian Hardware Oriented Security and Trust Symposium
AsianHOST 2018-Asian Hardware Oriented Security and Trust Symposium, Dec 2018, Hong Kong, China. pp.1-13, ⟨10.1109/asianhost.2018.8607177⟩
AsianHOST
AsianHOST 2018-Asian Hardware Oriented Security and Trust Symposium, Dec 2018, Hong Kong, China. pp.1-13, ⟨10.1109/asianhost.2018.8607177⟩
AsianHOST
Most of hardware-assisted solutions for software security, program monitoring, and event-checking approaches require instrumentation of the target software, an operation which can be performed using an SBI (Static Binary Instrumentation) or a DBI (Dy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ffa2274481577dcb8bbb1c342cb4e40d
https://hal.science/hal-01911621
https://hal.science/hal-01911621