Security-Driven Task Scheduling for Multiprocessor System-on-Chips with Performance Constraints

被引:1
|
作者
Wang, Nan [1 ]
Yao, Manting [1 ]
Jiang, Dongxu [1 ]
Chen, Song [2 ]
Zhu, Yu [1 ]
机构
[1] East China Univ Sci & Technol, Sch Informat Sci & Engn, Shanghai, Peoples R China
[2] Univ Sci & Technol China, Sch Informat Sci & Technol, Hefei, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
MPSoC; hardware Trojan; security; task scheduling; system performance; HARDWARE;
D O I
10.1109/ISVLSI.2018.00105
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The high penetration of third-party intellectual property (3PIP) brings a high risk of malicious inclusions and data leakage in products due to the planted hardware Trojans, and system level security constraints have recently been proposed for MPSoCs protection against hardware Trojans. However, secret communication still can be established in the context of the proposed security constraints, and thus, another type of security constraints is also introduced to fully prevent such malicious inclusions. In addition, fulfilling the security constraints incurs serious overhead of schedule length, and a two-stage performance-constrained task scheduling algorithm is then proposed to maintain most of the security constraints. In the first stage, the schedule length is iteratively reduced by assigning sets of adjacent tasks into the same core after calculating the maximum weight independent set of a graph consisting of all timing critical paths. In the second stage, tasks are assigned to proper IP vendors and scheduled to time periods with a minimization of cores required. The experimental results show that our work reduces the schedule length of a task graph, while only a small number of security constraints are violated.
引用
收藏
页码:545 / 550
页数:6
相关论文
共 50 条
  • [1] Performance Estimation of Pipelined MultiProcessor System-on-Chips (MPSoCs)
    Javaid, Haris
    Ignjatovic, Aleksander
    Parameswaran, Sri
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (08) : 2159 - 2168
  • [2] Security-Driven Task Scheduling Based on Evolutionary Algorithm
    Zhu, Hai
    Wang, Yuping
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1012 - 1017
  • [3] Trace-Driven Workload Simulation Method for Multiprocessor System-On-Chips
    Isshiki, Tsuyoshi
    Li, Dongju
    Kunieda, Hiroaki
    Isomura, Toshio
    Satou, Kazuo
    [J]. DAC: 2009 46TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2009, : 232 - +
  • [4] A MapReduce architecture for embedded multiprocessor system-on-chips
    Xiao, Hao
    Zhang, Huajuan
    Ge, Fen
    Wu, Ning
    [J]. IEICE ELECTRONICS EXPRESS, 2016, 13 (02):
  • [5] Models and formal verification of multiprocessor system-on-chips
    Brekling, Aske
    Hansen, Michael R.
    Madsen, Jan
    [J]. JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2008, 77 (1-2): : 1 - 19
  • [6] Memory-Aware Task Scheduling with Communication Overhead Minimization for Streaming Applications on Bus-Based Multiprocessor System-on-Chips
    Wang, Yi
    Shao, Zili
    Chan, Henry C. B.
    Liu, Duo
    Guan, Yong
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (07) : 1797 - 1807
  • [7] Security-driven scheduling algorithms based on Eigentrust in Grid
    Li, KL
    He, Y
    Liu, XL
    Wang, Y
    [J]. PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 1068 - 1072
  • [8] A predictive thermal model combined with the second derivative for multiprocessor system-on-chips
    [J]. Zhou, Lei (tomcat800607@126.com), 2016, Chinese Institute of Electronics (44):
  • [9] System-level performance analysis of multiprocessor system-on-chips by combining analytical model and execution time variation
    Kim, Sungchan
    Ha, Soonhoi
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2014, 38 (03) : 233 - 245
  • [10] Security-driven on grids scheduling for data-intensive applications
    Tao Xie
    Xiao Qin
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2007, 10 (02): : 145 - 153