Door Knock: Reverse Engineering the MPSoC Layout Through Timing Attack on NoC

Dipesh,Urbi Chatterjee
DOI: https://doi.org/10.1109/les.2024.3371106
IF: 1.524
2024-01-01
IEEE Embedded Systems Letters
Abstract:Multi-Processor Systems-on-Chip (MPSoC) have emerged as highly versatile and efficient platforms suitable for a wide range of applications like multimedia applications and telecommunication architectures. One of the key components in MPSoC is the Network-on-Chip (NoC), which facilitates the interconnection of various processing elements, enabling efficient data communication. Several timing attacks, such as Earthquake attack, P+P Firecracker, and P+P Arrow have been proposed on NoC that exploit the variations in execution times of operations to infer cryptographic keys. In this letter, we propose to leverage the timing attack on NoC to reverse engineer the mapping of each processing element onto the MPSoC architecture. To the best of our knowledge, it is the first work that relies on creating the contention between the requests that are sent to different PEs and reveal the layout by just analysing the reply latency. In the experimental setup, we are able to map PEs for MPSoC consists of Mesh, Torus, Point-to-Point, Ring, and Flattened Butterfly NoC topology with 100% accuracy that can be extremely useful for the attackers in the reconnaissance phase. Further, as the existing mitigation techniques to counter timing attacks are based on the assumption that the contention is created between the packets of secure-insecure domains, they will not be able to mitigate the proposed reverse engineering attack.
computer science, software engineering, hardware & architecture
What problem does this paper attempt to address?