Document Type
Conference Paper
Journal/Book Title/Conference
DAC '16: Proceedings of the 53rd Annual Design Automation Conference
Publisher
Association for Computing Machinery
Publication Date
6-5-2016
Abstract
Power management units (PMU) have come into the spotlight with energy efficiency becoming a first order constraint in MPSoC designs. To cater to the exponential rise in power events, and to meet the demands of tight power and energy budgets, PMUs are evolving to more complex and intelligent designs. In an era defined by energy efficient computing, a malicious circuit embedded in a third party PMU can adversely affect the operation of the entire MPSoC. This work presents and evaluates two covert security threats, P-VIRUS and DROWSY, designed using a malicious third party PMU. Further, we propose a non-invasive IP risk assessment module to monitor the trustworthiness of the deployed PMU. Our techniques help flag malicious activities in the PMU with less than 1% area and power overheads.
Recommended Citation
Rajesh JayashankaraShridevi, Chidhambaranathan R, Sanghamitra Roy and Koushik Chakraborty, Catching the Flu: Emerging threats from a Third Party Power Management Unit. IEEE/ACM Design Automation Conference (DAC), pp. -6, June 2016, Austin, Texas.
Comments
© 2016. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in DAC '16: Proceedings of the 53rd Annual Design Automation Conference, http://dx.doi.org/10.1145/2897937.2897994