{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:03:52Z","timestamp":1742922232066,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615445"},{"type":"electronic","value":"9789819615452"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1545-2_1","type":"book-chapter","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:54:46Z","timestamp":1739379286000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SMP-NoC: A Flexible and\u00a0Efficient Shared Memory Protection Unit on\u00a0Network-on-Chip"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9395-4692","authenticated-orcid":false,"given":"Teng","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3746-1601","authenticated-orcid":false,"given":"Ying","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0501-2812","authenticated-orcid":false,"given":"Shengjun","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Changzhen","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,13]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Daoud, L., Rafla, N.: Analysis of black hole router attack in network-on-chip, Midwest Symposium on Circuits and Systems, pp. 69\u201372 (2019)","DOI":"10.1109\/MWSCAS.2019.8884979"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Porquet, J., Greiner, A., Schwarz, C.: NoC-MPU: a secure architecture for flexible co-hosting on shared memory MPSoCs, design, automation, and test in Europe, pp. 1\u20134 (2011)","DOI":"10.1109\/DATE.2011.5763291"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Ancajas, D.M., Chakraborty, K., Roy, S.: Fort-NoCs: mitigating the threat of a compromised NoC. In: Design Automation Conference, pp. 1\u20136 (2014)","DOI":"10.1145\/2593069.2593144"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Liu S, Chauhan S, Karanth A. SNAC: mitigation of snoop-based attacks with multi-tier security in NoC architectures. In: Proceedings of the Great Lakes Symposium on VLSI 2024, pp. 560\u2013563 (2024)","DOI":"10.1145\/3649476.3658769"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Martin, K.J., Rizk, M., Sepulveda, M.J., Diguet, J.P.: Notifying memories: a case-study on data-flow applications with NoC interfaces implementation. In: Design Automation Conference (2016)","DOI":"10.1145\/2897937.2898051"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Sepulveda, J., Fl\u00f3rez, D., Fernandes, R., Marcon, C., Gogniat, G., Sigl, G.: Towards risk aware NoCs for data protection in MPSoCs. In: Reconfigurable Communication Centric Systems on Chip, pp. 1\u20138 (2016)","DOI":"10.1109\/ReCoSoC.2016.7533898"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Ribot Gonz\u00e1lez, Y., Nelissen, G., Tovar, E.: IPDeN 2.0: Real-time NoC with selective flit deflection and buffering. In: Proceedings of the 31st International Conference on Real-Time Networks and Systems, pp. 87\u201398 (2023)","DOI":"10.1145\/3575757.3575758"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Hassan, M.G., et al.: SurfNoC: a low latency and provably non-interfering approach to secure networks-on-chip. Int. Sympos. Comput. Archit. 583\u2013594 (2013)","DOI":"10.1145\/2508148.2485972"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Raparti, V.Y., Pasricha, S.: Lightweight mitigation of hardware trojan attacks in NoC-based manycore computing. In: Design Automation Conference (2019)","DOI":"10.1145\/3316781.3317851"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Boraten, T., Kodi, A.K.: Packet security with path sensitization for NoCs, design, automation, and test in Europe, pp. 1136\u20131139 (2016)","DOI":"10.3850\/9783981537079_0180"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Fiorin, L., Palermo, G., Lukovic, S., Catalano, V., Silvano, C.: Secure Memory accesses on networks-on-chip. In: IEEE Transactions on Computers, pp. 1216\u20131229 (2008)","DOI":"10.1109\/TC.2008.69"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Omar, H., Khan, O.: Ironhide: a secure multicore that efficiently mitigates microarchitecture state attacks for interactive applications. In: 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA), pp. 111\u2013122 (2020)","DOI":"10.1109\/HPCA47549.2020.00019"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Bourgeat, T., Lebedev, I., Wright, A., Zhang, S., Arvind and Devadas, S.: MI6: secure enclaves in a speculative out-of-order processor. arXiv (2019)","DOI":"10.1145\/3352460.3358310"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Wagh, S., Mittal, P., Wentzlaff, D.: Camouflage: memory traffic shaping to mitigate timing attacks. In: 2017 IEEE International Symposium on High Performance Computer Architecture, pp. 337\u2013348 (2019)","DOI":"10.1109\/HPCA.2017.36"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Chittamuru, S.V.R., et al.: SOTERIA: exploiting process variations to enhance hardware security with photonic NoC architectures. In: Proceedings of the 55th Annual Design Automation Conference (2018)","DOI":"10.1145\/3195970.3196118"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Boraten, T., Kodi, A.K.: Mitigation of denial of service attack with hardware trojans in noc architectures. In: 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS), IEEE (2016)","DOI":"10.1109\/IPDPS.2016.59"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Zhao, W., et al.: MPTEE: bringing flexible and efficient memory protection to Intel SGX. In: Proceedings of the Fifteenth European Conference on Computer Systems (2020)","DOI":"10.1145\/3342195.3387536"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Catania, V., Mineo, A., Monteleone, S., Palesi, M., Patti, D.: Energy efficient transceiver in wireless Network on Chip architectures, Design, automation & test in Europe conference & exhibition (DATE). Dresden 2016, 1321\u20131326 (2016)","DOI":"10.3850\/9783981537079_0736"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Yu, J., Fan, Y., Yi, X., et al.: TPNoC: an efficient topology reconfigurable NoC generator. In: Proceedings of the Great Lakes Symposium on VLSI 2023, pp. 77\u201382 (2023)","DOI":"10.1145\/3583781.3590257"},{"issue":"1","key":"1_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3639259","volume":"2","author":"S Liu","year":"2024","unstructured":"Liu, S., Multazzu, L., Wei, H., et al.: NOC-NOC: towards performance-optimal distributed transactions. Proc. ACM Manage. Data 2(1), 1\u201325 (2024)","journal-title":"Proc. ACM Manage. Data"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1545-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:55:10Z","timestamp":1739379310000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1545-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615445","9789819615452"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1545-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}