Abstract

Increasing demand for high performance and energy efficiency along with time-to-market pressures have led to a growing number of third-party accelerators in modern System-on-Chips (SoCs). However, the third-party accelerators may introduce vulnerabilities due to malicious intent or elusive design bugs that escape through verification processes. These vulnerabilities can be exploited by various attackers which can corrupt the entire system. Flooding is one such attack that is triggered by a malicious third-party accelerator to obstruct on-chip network communication by injecting useless packets leading to Denial-of-Service. To secure accelerator-rich SoCs from flooding attacks, we propose a two-step attack detection framework that leverages machine learning (ML) models to detect an attack scenario. The ML-based solution along with hierarchical feature data aggregation and feature packet prioritization provides an accurate attack detection with minimal performance overheads. Experimental evaluations with real accelerator benchmarks show the effectiveness of our framework achieving a detection accuracy of up to 97 % across various ML classifiers.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.