{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:02Z","timestamp":1750306262264,"version":"3.41.0"},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2016,11,3]],"date-time":"2016-11-03T00:00:00Z","timestamp":1478131200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGBED Rev."],"published-print":{"date-parts":[[2016,11,3]]},"abstract":"<jats:p>In this paper, we explore a new approach for the security of flow transmission in a Network-on-Chip. This approach is based on a dual mixed criticality approach where the criticality of a flow (HI or LO) is associated to timeliness and security constraints on flow transmission. Flow of HI criticality should be protected from Denial of Service (DoS) and side channel attacks while LO flows are assumed to be non secured. We propose a solution to detect abnormal flow profiles in a Network-on-Chip, that can result from a security attack and we provide a mixed criticality approach to mitigate the impact of an attack. This is done by switching the nodes of a Network-on-Chip subject to a security attack from LO to HI criticality and taking protection measures in HI mode to contain the security attack. Our solution relies on a mechanism, configured and managed by a hypervisor applied in all IPs connected to the Network-on-Chip.<\/jats:p>","DOI":"10.1145\/3015037.3015048","type":"journal-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T12:49:04Z","timestamp":1478263744000},"page":"67-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A mixed criticality approach for the security of critical flows in a network-on-chip"],"prefix":"10.1145","volume":"13","author":[{"given":"Ermis","family":"Papastefanakis","sequence":"first","affiliation":[{"name":"Thales Communications and Security, Gennevilliers, France and Universit\u00e9 Paris-Est, LIGM \/ ESIEE, Champs sur Marne, France"}]},{"given":"Xiaoting","family":"Li","sequence":"additional","affiliation":[{"name":"ECE Paris, Paris, France"}]},{"given":"Laurent","family":"George","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Paris-Est, LIGM \/ ESIEE, Champs sur Marne, France"}]}],"member":"320","published-online":{"date-parts":[[2016,11,3]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"\"Common criteria website \" https:\/\/www.commoncriteriaportal.org 2016 {Online; accessed 25-May-2016}.  \"Common criteria website \" https:\/\/www.commoncriteriaportal.org 2016 {Online; accessed 25-May-2016}."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/378239.379048"},{"key":"e_1_2_1_3_1","first-page":"166","volume-title":"IEEE Workshop on. IEEE","author":"Evain S.","year":"2005"},{"key":"e_1_2_1_4_1","first-page":"113","volume-title":"Proceedings. IEEE Computer Society Annual Symposium on. IEEE","author":"Gebotys C. H.","year":"2003"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2014.173"},{"key":"e_1_2_1_6_1","first-page":"609","volume-title":"2013 IEEE 20th International Conference on. IEEE","author":"Baron S.","year":"2013"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOCS.2012.24"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.05.333"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2015.12"},{"key":"e_1_2_1_10_1","first-page":"184","volume-title":"2014 IEEE. IEEE","author":"Burns A.","year":"2014"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"}],"container-title":["ACM SIGBED Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3015037.3015048","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3015037.3015048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:18Z","timestamp":1750220658000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3015037.3015048"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,3]]},"references-count":11,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,11,3]]}},"alternative-id":["10.1145\/3015037.3015048"],"URL":"https:\/\/doi.org\/10.1145\/3015037.3015048","relation":{},"ISSN":["1551-3688"],"issn-type":[{"type":"electronic","value":"1551-3688"}],"subject":[],"published":{"date-parts":[[2016,11,3]]},"assertion":[{"value":"2016-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}