{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T23:23:43Z","timestamp":1774653823387,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T00:00:00Z","timestamp":1633651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Research Foundation, Singapore.","award":["NRF-RSSS2016-05 and NRF2018NCR-NCR002"],"award-info":[{"award-number":["NRF-RSSS2016-05 and NRF2018NCR-NCR002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,14]]},"DOI":"10.1145\/3479876.3481595","type":"proceedings-article","created":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T19:14:45Z","timestamp":1633461285000},"page":"67-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Sentry-NoC"],"prefix":"10.1145","author":[{"given":"Ahmed","family":"Shalaby","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Yaswanth","family":"Tavva","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Trevor E.","family":"Carlson","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Li-Shiuan","family":"Peh","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2021,10,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. https:\/\/greenwaves-technologies.com\/.  [n.d.]. https:\/\/greenwaves-technologies.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. https:\/\/www.dovermicrosystems.com\/.  [n.d.]. https:\/\/www.dovermicrosystems.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. https:\/\/shakti.org.in\/.  [n.d.]. https:\/\/shakti.org.in\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2015. https:\/\/www.symantec.com\/connect\/blogs\/iot-smart-home-giving-away-keys-your-kingdom\/.  2015. https:\/\/www.symantec.com\/connect\/blogs\/iot-smart-home-giving-away-keys-your-kingdom\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2017. https:\/\/www.bbc.com\/news\/technology-38573074\/.  2017. https:\/\/www.bbc.com\/news\/technology-38573074\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2017. https:\/\/newsroom.intel.com\/newsroom\/wp-content\/uploads\/sites\/11\/2017\/03\/Ruth-Brain-2017-Manufacturing.pdf\/.  2017. https:\/\/newsroom.intel.com\/newsroom\/wp-content\/uploads\/sites\/11\/2017\/03\/Ruth-Brain-2017-Manufacturing.pdf\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2019. www.ericsson.com\/en\/mobility-report\/reports\/november-2019\/.  2019. www.ericsson.com\/en\/mobility-report\/reports\/november-2019\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2019. https:\/\/www.csa.gov.sg\/news\/publications\/iot-security-landscape\/.  2019. https:\/\/www.csa.gov.sg\/news\/publications\/iot-security-landscape\/."},{"key":"e_1_3_2_1_9_1","volume-title":"Fortnocs: Mitigating the threat of a compromised noc. In &lt;u&gt;Proceedings of the 51st Annual Design Automation Conference&lt;\/u&gt;. 1--6.","author":"Ancajas Dean Michael","year":"2014","unstructured":"Dean Michael Ancajas , Koushik Chakraborty , and Sanghamitra Roy . 2014 . Fortnocs: Mitigating the threat of a compromised noc. In &lt;u&gt;Proceedings of the 51st Annual Design Automation Conference&lt;\/u&gt;. 1--6. Dean Michael Ancajas, Koushik Chakraborty, and Sanghamitra Roy. 2014. Fortnocs: Mitigating the threat of a compromised noc. In &lt;u&gt;Proceedings of the 51st Annual Design Automation Conference&lt;\/u&gt;. 1--6."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.06.014"},{"key":"e_1_3_2_1_11_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)&lt;\/u&gt;. IEEE, 1136--1139","author":"Boraten Travis","year":"2016","unstructured":"Travis Boraten and Avinash Karanth Kodi . 2016 . Packet security with path sensitization for NoCs. In &lt;u&gt;2016 Design , Automation & Test in Europe Conference & Exhibition (DATE)&lt;\/u&gt;. IEEE, 1136--1139 . Travis Boraten and Avinash Karanth Kodi. 2016. Packet security with path sensitization for NoCs. In &lt;u&gt;2016 Design, Automation & Test in Europe Conference & Exhibition (DATE)&lt;\/u&gt;. IEEE, 1136--1139."},{"key":"e_1_3_2_1_12_1","volume-title":"A configurable monitoring infrastructure for NoC-based architectures. &lt;u&gt","author":"Fiorin Leandro","year":"2013","unstructured":"Leandro Fiorin , Gianluca Palermo , and Cristina Silvano . 2013. A configurable monitoring infrastructure for NoC-based architectures. &lt;u&gt ;IEEE Transactions on Very Large Scale Integration (VLSI) Systems &lt;\/u&gt; 22, 11 ( 2013 ), 2438--2442. Leandro Fiorin, Gianluca Palermo, and Cristina Silvano. 2013. A configurable monitoring infrastructure for NoC-based architectures. &lt;u&gt;IEEE Transactions on Very Large Scale Integration (VLSI) Systems&lt;\/u&gt; 22, 11 (2013), 2438--2442."},{"key":"e_1_3_2_1_13_1","volume-title":"Survey on real-time networks-on-chip. &lt;u&gt","author":"Hesham Salma","year":"2016","unstructured":"Salma Hesham , Jens Rettkowski , Diana Goehringer , and Mohamed A Abd El Ghany . 2016. Survey on real-time networks-on-chip. &lt;u&gt ;IEEE Transactions on Parallel and Distributed Systems &lt;\/u&gt; 28, 5 ( 2016 ), 1500--1517. Salma Hesham, Jens Rettkowski, Diana Goehringer, and Mohamed A Abd El Ghany. 2016. Survey on real-time networks-on-chip. &lt;u&gt;IEEE Transactions on Parallel and Distributed Systems&lt;\/u&gt; 28, 5 (2016), 1500--1517."},{"key":"e_1_3_2_1_14_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)&lt;\/u&gt;. IEEE, 740--745","author":"Hwang Dongil","year":"2019","unstructured":"Dongil Hwang , Myonghoon Yang , Seongil Jeon , Younghan Lee , Donghyun Kwon , and Yunheung Paek . 2019 . Riskim: Toward complete kernel protection with hardware support. In &lt;u&gt;2019 Design , Automation & Test in Europe Conference & Exhibition (DATE)&lt;\/u&gt;. IEEE, 740--745 . Dongil Hwang, Myonghoon Yang, Seongil Jeon, Younghan Lee, Donghyun Kwon, and Yunheung Paek. 2019. Riskim: Toward complete kernel protection with hardware support. In &lt;u&gt;2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)&lt;\/u&gt;. IEEE, 740--745."},{"key":"e_1_3_2_1_15_1","volume-title":"Side-channel protected MPSoC through secure real-time networks-on-chip. &lt;u&gt;Microprocessors and Microsystems&lt;\/u&gt","author":"Indrusiak Leandro Soares","year":"2019","unstructured":"Leandro Soares Indrusiak , James Harbin , Cezar Reinbrecht , and Johanna Sep\u00falveda . 2019. Side-channel protected MPSoC through secure real-time networks-on-chip. &lt;u&gt;Microprocessors and Microsystems&lt;\/u&gt ; 68 ( 2019 ), 34--46. Leandro Soares Indrusiak, James Harbin, Cezar Reinbrecht, and Johanna Sep\u00falveda. 2019. Side-channel protected MPSoC through secure real-time networks-on-chip. &lt;u&gt;Microprocessors and Microsystems&lt;\/u&gt; 68 (2019), 34--46."},{"key":"e_1_3_2_1_16_1","volume-title":"Aleksandar Ignjatovic, and Sri Parameswaran.","author":"Jayasinghe Darshana","year":"2014","unstructured":"Darshana Jayasinghe , Roshan Ragel , Jude Angelo Ambrose , Aleksandar Ignjatovic, and Sri Parameswaran. 2014 . Advanced modes in AES : Are they safe from power analysis based side channel attacks?. In &lt;u&gt;2014 IEEE 32nd International Conference on Computer Design (ICCD)&lt;\/u&gt;. IEEE , 173--180. Darshana Jayasinghe, Roshan Ragel, Jude Angelo Ambrose, Aleksandar Ignjatovic, and Sri Parameswaran. 2014. Advanced modes in AES: Are they safe from power analysis based side channel attacks?. In &lt;u&gt;2014 IEEE 32nd International Conference on Computer Design (ICCD)&lt;\/u&gt;. IEEE, 173--180."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00209ED1V01Y200907CAC008"},{"key":"e_1_3_2_1_18_1","volume-title":"A security framework for noc using authenticated encryption and session keys. &lt;u&gt;Circuits, Systems, and Signal Processing&lt;\/u&gt","author":"Kapoor Hemangee K","year":"2013","unstructured":"Hemangee K Kapoor , G Bhoopal Rao , Sharique Arshi , and Gaurav Trivedi . 2013. A security framework for noc using authenticated encryption and session keys. &lt;u&gt;Circuits, Systems, and Signal Processing&lt;\/u&gt ; 32, 6 ( 2013 ), 2605--2622. Hemangee K Kapoor, G Bhoopal Rao, Sharique Arshi, and Gaurav Trivedi. 2013. A security framework for noc using authenticated encryption and session keys. &lt;u&gt;Circuits, Systems, and Signal Processing&lt;\/u&gt; 32, 6 (2013), 2605--2622."},{"key":"e_1_3_2_1_19_1","volume-title":"OpenSMART: Single-cycle multi-hop NoC generator in BSV and Chisel. In &lt;u&gt;2017 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)&lt;\/u&gt;","author":"Kwon Hyoukjun","unstructured":"Hyoukjun Kwon and Tushar Krishna . 2017. OpenSMART: Single-cycle multi-hop NoC generator in BSV and Chisel. In &lt;u&gt;2017 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)&lt;\/u&gt; . IEEE , 195--204. Hyoukjun Kwon and Tushar Krishna. 2017. OpenSMART: Single-cycle multi-hop NoC generator in BSV and Chisel. In &lt;u&gt;2017 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)&lt;\/u&gt;. IEEE, 195--204."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01742-1"},{"key":"e_1_3_2_1_21_1","volume-title":"Revealing the secrets of smart cards&lt;\/u&gt;","author":"Mangard Stefan","unstructured":"Stefan Mangard , Elisabeth Oswald , and Thomas Popp . 2008. &lt;u&gt; Power analysis attacks : Revealing the secrets of smart cards&lt;\/u&gt; . Vol. 31 . Springer Science & Business Media . Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2008. &lt;u&gt;Power analysis attacks: Revealing the secrets of smart cards&lt;\/u&gt;. Vol. 31. Springer Science & Business Media."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267494.3267500"},{"key":"e_1_3_2_1_23_1","volume-title":"Examining smart-card security under the threat of power analysis attacks. &lt;u&gt","author":"Messerges Thomas S","year":"2002","unstructured":"Thomas S Messerges , Ezzat A Dabbish , and Robert H Sloan . 2002. Examining smart-card security under the threat of power analysis attacks. &lt;u&gt ; IEEE transactions on computers&lt;\/u&gt; 51, 5 ( 2002 ), 541--552. Thomas S Messerges, Ezzat A Dabbish, and Robert H Sloan. 2002. Examining smart-card security under the threat of power analysis attacks. &lt;u&gt;IEEE transactions on computers&lt;\/u&gt; 51, 5 (2002), 541--552."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Maire O'Neill etal 2016. Insecurity by design: Today's IoT device security problem. &lt;u&gt;Engineering&lt;\/u&gt; 2 1 (2016) 48--49.  Maire O'Neill et al. 2016. Insecurity by design: Today's IoT device security problem. &lt;u&gt;Engineering&lt;\/u&gt; 2 1 (2016) 48--49.","DOI":"10.1016\/J.ENG.2016.01.014"},{"key":"e_1_3_2_1_26_1","volume-title":"DCFNoC: A Delayed Conflict-Free Time Division Multiplexing Network on Chip. In &lt;u&gt;Proceedings of the 56th Annual Design Automation Conference 2019&lt;\/u&gt;. 1--6","author":"Picornell Tom\u00e1s","unstructured":"Tom\u00e1s Picornell , Jos\u00e9 Flich , Carles Hern\u00e1ndez , and Jos\u00e9 Duato . 2019. DCFNoC: A Delayed Conflict-Free Time Division Multiplexing Network on Chip. In &lt;u&gt;Proceedings of the 56th Annual Design Automation Conference 2019&lt;\/u&gt;. 1--6 . Tom\u00e1s Picornell, Jos\u00e9 Flich, Carles Hern\u00e1ndez, and Jos\u00e9 Duato. 2019. DCFNoC: A Delayed Conflict-Free Time Division Multiplexing Network on Chip. In &lt;u&gt;Proceedings of the 56th Annual Design Automation Conference 2019&lt;\/u&gt;. 1--6."},{"key":"e_1_3_2_1_27_1","volume-title":"Automation & Test in Europe&lt;\/u&gt;","author":"Porquet Jo\u00ebl","unstructured":"Jo\u00ebl Porquet , Alain Greiner , and Christian Schwarz . 2011. NoC-MPU: A secure architecture for flexible co-hosting on shared memory MPSoCs. In &lt;u&gt;2011 Design , Automation & Test in Europe&lt;\/u&gt; . IEEE , 1--4. Jo\u00ebl Porquet, Alain Greiner, and Christian Schwarz. 2011. NoC-MPU: A secure architecture for flexible co-hosting on shared memory MPSoCs. In &lt;u&gt;2011 Design, Automation & Test in Europe&lt;\/u&gt;. IEEE, 1--4."},{"key":"e_1_3_2_1_28_1","volume-title":"A statically scheduled time-division-multiplexed network-on-chip for real-time systems. In &lt;u&gt;2012 IEEE\/ACM Sixth International Symposium on Networks-on-Chip&lt;\/u&gt;","author":"Schoeberl Martin","unstructured":"Martin Schoeberl , Florian Brandner , Jens Spars\u00f8 , and Evangelia Kasapaki . 2012. A statically scheduled time-division-multiplexed network-on-chip for real-time systems. In &lt;u&gt;2012 IEEE\/ACM Sixth International Symposium on Networks-on-Chip&lt;\/u&gt; . IEEE , 152--160. Martin Schoeberl, Florian Brandner, Jens Spars\u00f8, and Evangelia Kasapaki. 2012. A statically scheduled time-division-multiplexed network-on-chip for real-time systems. In &lt;u&gt;2012 IEEE\/ACM Sixth International Symposium on Networks-on-Chip&lt;\/u&gt;. IEEE, 152--160."},{"key":"e_1_3_2_1_29_1","volume-title":"Evaluation of correlation power analysis resistance and its application on asymmetric mask protected data encryption standard hardware. &lt;u&gt","author":"Shan Weiwei","year":"2013","unstructured":"Weiwei Shan , Xin Chen , Bo Li , Peng Cao , Jie Li , Gugang Gao , and Longxing Shi . 2013. Evaluation of correlation power analysis resistance and its application on asymmetric mask protected data encryption standard hardware. &lt;u&gt ;IEEE Transactions on Instrumentation and Measurement &lt;\/u&gt; 62, 10 ( 2013 ), 2716--2724. Weiwei Shan, Xin Chen, Bo Li, Peng Cao, Jie Li, Gugang Gao, and Longxing Shi. 2013. Evaluation of correlation power analysis resistance and its application on asymmetric mask protected data encryption standard hardware. &lt;u&gt;IEEE Transactions on Instrumentation and Measurement&lt;\/u&gt; 62, 10 (2013), 2716--2724."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485972"},{"key":"e_1_3_2_1_31_1","unstructured":"Oskar Westman. 2018. Electromagnetic analysis of AES-256 on Xilinx Artix-7. (2018).  Oskar Westman. 2018. Electromagnetic analysis of AES-256 on Xilinx Artix-7. (2018)."}],"event":{"name":"NOCS '21: International Symposium on Networks-on-Chip","location":"Virtual Event","acronym":"NOCS '21","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","SIGDA ACM Special Interest Group on Design Automation","SIGARCH ACM Special Interest Group on Computer Architecture","IEEE CAS","IEEE Council on Electronic Design Automation (CEDA)"]},"container-title":["Proceedings of the 15th IEEE\/ACM International Symposium on Networks-on-Chip"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479876.3481595","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3479876.3481595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:19:01Z","timestamp":1750191541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479876.3481595"}},"subtitle":["a statically-scheduled NoC for secure SoCs"],"short-title":[],"issued":{"date-parts":[[2021,10,8]]},"references-count":30,"alternative-id":["10.1145\/3479876.3481595","10.1145\/3479876"],"URL":"https:\/\/doi.org\/10.1145\/3479876.3481595","relation":{},"subject":[],"published":{"date-parts":[[2021,10,8]]},"assertion":[{"value":"2021-10-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}