{"id":"https://openalex.org/W2509593558","doi":"https://doi.org/10.1109/recosoc.2017.8016142","title":"Side-channel attack resilience through route randomisation in secure real-time Networks-on-Chip","display_name":"Side-channel attack resilience through route randomisation in secure real-time Networks-on-Chip","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2509593558","doi":"https://doi.org/10.1109/recosoc.2017.8016142","mag":"2509593558"},"language":"en","primary_location":{"id":"doi:10.1109/recosoc.2017.8016142","is_oa":false,"landing_page_url":"https://doi.org/10.1109/recosoc.2017.8016142","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://eprints.whiterose.ac.uk/118107/1/IndrusiakHarbinSepulvedaNoCSecurityv3.0_ReCoSoC2017_cameraready.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020591718","display_name":"Leandro Soares Indrusiak","orcid":"https://orcid.org/0000-0002-9938-2920"},"institutions":[{"id":"https://openalex.org/I52099693","display_name":"University of York","ror":"https://ror.org/04m01e293","country_code":"GB","type":"education","lineage":["https://openalex.org/I52099693"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Leandro Soares Indrusiak","raw_affiliation_strings":["Department of Computer Science, University of York, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of York, UK","institution_ids":["https://openalex.org/I52099693"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039375635","display_name":"James Harbin","orcid":"https://orcid.org/0000-0002-6479-8600"},"institutions":[{"id":"https://openalex.org/I52099693","display_name":"University of York","ror":"https://ror.org/04m01e293","country_code":"GB","type":"education","lineage":["https://openalex.org/I52099693"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"James Harbin","raw_affiliation_strings":["Department of Computer Science, University of York, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of York, UK","institution_ids":["https://openalex.org/I52099693"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008278213","display_name":"Martha Johanna Sep\u00falveda","orcid":null},"institutions":[{"id":"https://openalex.org/I1317578790","display_name":"Federal Office for Information Security","ror":"https://ror.org/03v7mmm26","country_code":"DE","type":"other","lineage":["https://openalex.org/I1317578790"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Martha Johanna Sepulveda","raw_affiliation_strings":["Institute for Security in Information Technology, Technische Universitaet Muenchen, Germany"],"affiliations":[{"raw_affiliation_string":"Institute for Security in Information Technology, Technische Universitaet Muenchen, Germany","institution_ids":["https://openalex.org/I1317578790"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020591718"],"corresponding_institution_ids":["https://openalex.org/I52099693"],"apc_list":null,"apc_paid":null,"fwci":3.0696,"has_fulltext":true,"cited_by_count":28,"citation_normalized_percentile":{"value":0.92329876,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10829","display_name":"Interconnection Networks and Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10829","display_name":"Interconnection Networks and Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.980400025844574,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8349251747131348},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7087087631225586},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6803785562515259},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6505600810050964},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6195436716079712},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.5237553119659424},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4962940812110901},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48471617698669434},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.46041423082351685},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.44879403710365295},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.41342049837112427},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.40216052532196045},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3564823269844055},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3035596013069153}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8349251747131348},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7087087631225586},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6803785562515259},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6505600810050964},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6195436716079712},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.5237553119659424},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4962940812110901},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48471617698669434},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.46041423082351685},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.44879403710365295},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.41342049837112427},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40216052532196045},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3564823269844055},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3035596013069153},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/recosoc.2017.8016142","is_oa":false,"landing_page_url":"https://doi.org/10.1109/recosoc.2017.8016142","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.whiterose.ac.uk:118107","is_oa":true,"landing_page_url":"https://orcid.org/0000-0002-9938-2920>,","pdf_url":"https://eprints.whiterose.ac.uk/118107/1/IndrusiakHarbinSepulvedaNoCSecurityv3.0_ReCoSoC2017_cameraready.pdf","source":{"id":"https://openalex.org/S4306400854","display_name":"White Rose Research Online (University of Leeds, The University of Sheffield, University of York)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800616092","host_organization_name":"White Rose University Consortium","host_organization_lineage":["https://openalex.org/I2800616092"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"}],"best_oa_location":{"id":"pmh:oai:eprints.whiterose.ac.uk:118107","is_oa":true,"landing_page_url":"https://orcid.org/0000-0002-9938-2920>,","pdf_url":"https://eprints.whiterose.ac.uk/118107/1/IndrusiakHarbinSepulvedaNoCSecurityv3.0_ReCoSoC2017_cameraready.pdf","source":{"id":"https://openalex.org/S4306400854","display_name":"White Rose Research Online (University of Leeds, The University of Sheffield, University of York)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800616092","host_organization_name":"White Rose University Consortium","host_organization_lineage":["https://openalex.org/I2800616092"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1982836005","display_name":"Mixed Criticality Cyber Physical Systems","funder_award_id":"EP/P003664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G3275337142","display_name":null,"funder_award_id":"EP/K011626/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G7848565558","display_name":null,"funder_award_id":"EP/P003664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G8555633116","display_name":"Mixed Criticality Embedded Systems on Many-Core Platforms","funder_award_id":"EP/K011626/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G8719353587","display_name":null,"funder_award_id":"EP/P0","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2509593558.pdf","grobid_xml":"https://content.openalex.org/works/W2509593558.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1529728259","https://openalex.org/W1567468802","https://openalex.org/W1976658155","https://openalex.org/W1977738269","https://openalex.org/W2010551507","https://openalex.org/W2022098216","https://openalex.org/W2022110509","https://openalex.org/W2041240648","https://openalex.org/W2043254158","https://openalex.org/W2044162995","https://openalex.org/W2057785859","https://openalex.org/W2085447084","https://openalex.org/W2086037506","https://openalex.org/W2091178531","https://openalex.org/W2122941380","https://openalex.org/W2130183852","https://openalex.org/W2136613319","https://openalex.org/W2141497161","https://openalex.org/W2152099665","https://openalex.org/W2153719947","https://openalex.org/W2159526626","https://openalex.org/W2168203451","https://openalex.org/W2171121617","https://openalex.org/W2278553053","https://openalex.org/W2284003312","https://openalex.org/W2342508099","https://openalex.org/W2546293708","https://openalex.org/W4245160202","https://openalex.org/W4253689356"],"related_works":["https://openalex.org/W3131321414","https://openalex.org/W182679101","https://openalex.org/W3006344745","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W1971956962","https://openalex.org/W2188560665","https://openalex.org/W4212981280","https://openalex.org/W2162805750","https://openalex.org/W2538033728"],"abstract_inverted_index":{"Security":[0],"can":[1,92,166],"be":[2,93],"seen":[3],"as":[4,13,21,53,116],"an":[5,96,134,148],"optimization":[6,150],"objective":[7],"in":[8,58,160],"NoC":[9,32,84,121,168],"resource":[10],"management,":[11],"and":[12,56,185],"such":[14,20,133,161],"poses":[15],"trade-offs":[16],"against":[17,34,123],"other":[18],"objectives":[19],"real-time":[22,138,176],"schedulability.":[23],"In":[24],"this":[25],"paper,":[26],"we":[27,152],"show":[28,153],"how":[29,154],"to":[30,63,98,119,155],"increase":[31,120,167],"resilience":[33,122],"a":[35,76,79,88,103,117,143,162],"concrete":[36],"type":[37],"of":[38,61,68,75,82,102,132],"security":[39,169],"attack,":[40,43],"named":[41],"side-channel":[42,124],"which":[44,91],"exploit":[45],"the":[46,59,65,73,83,129],"correlation":[47],"between":[48],"specific":[49,100],"non-functional":[50],"properties":[51],"(such":[52],"packet":[54,77,113],"latencies":[55],"routes,":[57],"case":[60],"NoCs)":[62],"infer":[64],"functional":[66],"behaviour":[67],"secure":[69],"applications.":[70],"For":[71],"instance,":[72],"transmission":[74],"over":[78],"given":[80],"link":[81],"may":[85],"hint":[86],"on":[87,128,174,183],"cache":[89],"miss,":[90],"used":[94],"by":[95],"attacker":[97],"guess":[99],"parts":[101],"secret":[104],"cryptographic":[105],"key,":[106],"effectively":[107,156],"weakening":[108],"it.":[109],"We":[110],"therefore":[111],"propose":[112],"route":[114,158],"randomization":[115,159],"mechanism":[118],"attacks,":[125],"focusing":[126],"specifically":[127],"potential":[130],"impact":[131,173],"approach":[135],"upon":[136],"hard":[137,175],"systems,":[139],"where":[140],"schedulability":[141],"is":[142],"vital":[144],"design":[145],"requirement.":[146],"Using":[147],"evolutionary":[149],"approach,":[151],"apply":[157],"way":[163],"that":[164],"it":[165],"while":[170],"controlling":[171],"its":[172],"performance":[177],"guarantees.":[178],"Extensive":[179],"experimental":[180],"evidence":[181],"based":[182],"analytical":[184],"simulation":[186],"models":[187],"supports":[188],"our":[189],"findings.":[190]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
