{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T10:16:45Z","timestamp":1775384205773,"version":"3.50.1"},"reference-count":48,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T00:00:00Z","timestamp":1729555200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Emerg. Technol. Comput. Syst."],"published-print":{"date-parts":[[2024,10,31]]},"abstract":"<jats:p>Network-on-chip (NoC) is widely used to facilitate communication between components in sophisticated system-on-chip (SoC) designs. Security of the on-chip communication is crucial because exploiting any vulnerability in shared NoC would be a goldmine for an attacker that puts the entire computing infrastructure at risk. We investigate the security strength of existing anonymous routing protocols in NoC architectures, making two pivotal contributions. Firstly, we develop and perform a machine learning (ML)-based flow correlation attack on existing anonymous routing techniques in NoC systems, revealing that they provide only packet-level anonymity. Secondly, we propose a novel, lightweight anonymous routing protocol featuring outbound traffic tunneling and traffic obfuscation. This protocol is designed to provide robust defense against ML-based flow correlation attacks, ensuring both packet-level and flow-level anonymity. Experimental evaluation using both real and synthetic traffic demonstrates that our proposed attack successfully deanonymizes state-of-the-art anonymous routing in NoC architectures with high accuracy (up to 99%) for diverse traffic patterns. It also reveals that our lightweight anonymous routing protocol can defend against ML-based attacks with minor hardware and performance overhead.<\/jats:p>","DOI":"10.1145\/3677034","type":"journal-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T15:37:36Z","timestamp":1720625856000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Breaking On-Chip Communication Anonymity Using Flow Correlation Attacks"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7107-8137","authenticated-orcid":false,"given":"Hansika","family":"Weerasena","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3653-6221","authenticated-orcid":false,"given":"Prabhat","family":"Mishra","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,10,22]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"38","volume-title":"Proceedings of the 2009 IEEE International Symposium on Performance Analysis of Systems and Software","author":"Agarwal Niket","year":"2009","unstructured":"Niket Agarwal, Tushar Krishna, Li-Shiuan Peh, and Niraj K. Jha. 2009. GARNET: A detailed on-chip network model inside a full-system simulator. In Proceedings of the 2009 IEEE International Symposium on Performance Analysis of Systems and Software. 38\u201342."},{"key":"e_1_3_1_3_2","first-page":"1","volume-title":"Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS \u201921)","author":"Ahmed M. Meraj","year":"2021","unstructured":"M. Meraj Ahmed, Abhijitt Dhavlle, Naseef Mansoor, Sai Manoj Pudukotai Dinakarrao, Kanad Basu, and Amlan Ganguly. 2021. What can a remote access hardware Trojan do to a network-on-chip? In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS \u201921). IEEE, 1\u20135."},{"key":"e_1_3_1_4_2","first-page":"1","volume-title":"Proceedings of the Asian Hardware Oriented Security and Trust Symposium (AsianHOST \u201920)","author":"Ahmed M. Meraj","year":"2020","unstructured":"M. Meraj Ahmed, Abhijitt Dhavlle, Naseef Mansoor, Purab Sutradhar, Sai Manoj Pudukotai Dinakarrao, Kanad Basu, and Amlan Ganguly. 2020. Defense against on-chip Trojans enabling traffic analysis attacks. In Proceedings of the Asian Hardware Oriented Security and Trust Symposium (AsianHOST \u201920). IEEE, 1\u20136."},{"key":"e_1_3_1_5_2","first-page":"1","volume-title":"Proceedings of the 51st Annual Design Automation Conference","author":"Ancajas Dean Michael","year":"2014","unstructured":"Dean Michael Ancajas, Koushik Chakraborty, and Sanghamitra Roy. 2014. Fort-NoCs: Mitigating the threat of a compromised NoC. In Proceedings of the 51st Annual Design Automation Conference. 1\u20136."},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/IISWC.2008.4636090","volume-title":"Proceedings of the 2008 IEEE International Symposium on Workload Characterization","author":"Bienia Christian","year":"2008","unstructured":"Christian Bienia, Sanjeev Kumar, and Kai Li. 2008. Parsec vs. splash-2: A quantitative comparison of two multithreaded benchmark suites on chip-multiprocessors. In Proceedings of the 2008 IEEE International Symposium on Workload Characterization. IEEE, 47\u201356."},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_1_8_2","first-page":"1091","volume-title":"Proceedings of the Parallel and Distributed Processing Symposium, 2016 IEEE International","author":"Boraten Travis","year":"2016","unstructured":"Travis Boraten and Avinash Karanth Kodi. 2016a. Mitigation of denial of service attack with hardware Trojans in NoC architectures. In Proceedings of the Parallel and Distributed Processing Symposium, 2016 IEEE International. IEEE, 1091\u20131100."},{"key":"e_1_3_1_9_2","first-page":"1136","volume-title":"Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE \u201916)","author":"Boraten Travis","year":"2016","unstructured":"Travis Boraten and Avinash Karanth Kodi. 2016b. Packet security with path sensitization for NoCs. In Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE \u201916). IEEE, 1136\u20131139."},{"key":"e_1_3_1_10_2","first-page":"1","volume-title":"Proceedings of the 12fth IEEE\/ACM International Symposium on Networks-on-Chip (NOCS \u201918)","author":"Boraten Travis H.","year":"2018","unstructured":"Travis H. Boraten and Avinash K. Kodi. 2018. Securing NoCs against timing attacks with non-interference based adaptive routing. In Proceedings of the 12fth IEEE\/ACM International Symposium on Networks-on-Chip (NOCS \u201918). IEEE, 1\u20138."},{"key":"e_1_3_1_11_2","first-page":"334","volume-title":"Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE \u201920)","author":"Charles Subodha","year":"2020","unstructured":"Subodha Charles, Megan Logan, and Prabhat Mishra. 2020. Lightweight anonymous routing in NoC based SoCs. In Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE \u201920). IEEE, 334\u2013337."},{"key":"e_1_3_1_12_2","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1109\/ISVLSI49217.2020.00038","volume-title":"Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI \u201920)","author":"Charles Subodha","year":"2020","unstructured":"Subodha Charles and Prabhat Mishra. 2020a. Lightweight and trust-aware routing in NoC-based SoCs. In Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI \u201920). 160\u2013167."},{"key":"e_1_3_1_13_2","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1109\/ISVLSI49217.2020.00039","volume-title":"Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI \u201920)","author":"Charles Subodha","year":"2020","unstructured":"Subodha Charles and Prabhat Mishra. 2020b. Securing network-on-chip using incremental cryptography. In Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI \u201920). IEEE, 168\u2013175."},{"issue":"5","key":"e_1_3_1_14_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3450964","article-title":"A survey of network-on-chip security attacks and countermeasures","volume":"54","author":"Charles Subodha","year":"2021","unstructured":"Subodha Charles and Prabhat Mishra. 2021. A survey of network-on-chip security attacks and countermeasures. ACM Computing Surveys (CSUR) 54, 5 (2021), 1\u201336.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_1_15_2","article-title":"Intel SGX explained","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. Cryptology ePrint Archive.","journal-title":"Cryptology ePrint Archive"},{"key":"e_1_3_1_16_2","first-page":"2857","volume-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security \u201922)","author":"Dai Miles","year":"2022","unstructured":"Miles Dai, Riccardo Paccagnella, Miguel Gomez-Garcia, John McCalpin, and Mengjia Yan. 2022. Don\u2019t mesh around:{side-channel} attacks and mitigations on mesh interconnects. In Proceedings of the 31st USENIX Security Symposium (USENIX Security \u201922). 2857\u20132874."},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3278618"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/1999946.1999974"},{"key":"e_1_3_1_20_2","first-page":"3913","volume-title":"IEEE Transactions on Intelligent Transportation Systems","volume":"20","author":"Guo Shengnan","year":"2019","unstructured":"Shengnan Guo, Youfang Lin, Shijie Li, Zhaoming Chen, and Huaiyu Wan. 2019. Deep spatial\u2013temporal 3D convolutional neural networks for traffic data forecasting. IEEE Transactions on Intelligent Transportation Systems 20, 10 (2019), 3913\u20133926."},{"key":"e_1_3_1_21_2","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/3-540-59497-3_175","volume-title":"Proceedings of the From Natural to Artificial Neural Computation: International Workshop on Artificial Neural Networks Malaga-Torremolinos","author":"Han Jun","year":"1995","unstructured":"Jun Han and Claudio Moraga. 1995. The influence of the sigmoid function parameters on the speed of backpropagation learning. In Proceedings of the From Natural to Artificial Neural Computation: International Workshop on Artificial Neural Networks Malaga-Torremolinos. Springer, 195\u2013201."},{"key":"e_1_3_1_22_2","volume-title":"System-on-Chip Security: Validation and Verification","author":"Huang Yuanwen","year":"2019","unstructured":"Yuanwen Huang, Prabhat Mishra, and Farimah Farahmandi. 2019. System-on-Chip Security: Validation and Verification. Springer Nature."},{"key":"e_1_3_1_23_2","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1109\/ISVLSI.2018.00070","volume-title":"Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI \u201918)","author":"Hussain Mubashir","year":"2018","unstructured":"Mubashir Hussain, Amin Malekpour, Hui Guo, and Sri Parameswaran. 2018. EETD: An energy efficient design for runtime hardware Trojan detection in untrusted network-on-chip. In Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI \u201918). IEEE, 345\u2013350."},{"key":"e_1_3_1_24_2","unstructured":"Intel. 2024. 5th Gen Intel\u00ae Xeon\u00ae Processors. Retrieved from https:\/\/www.intel.com\/content\/www\/us\/en\/products\/docs\/processors\/xeon\/5th-gen-xeon-product-brief.html [Online]."},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/2786572.2786580"},{"key":"e_1_3_1_26_2","first-page":"738","volume-title":"Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI \u201918)","author":"Jyv Manoj Kumar","year":"2018","unstructured":"Manoj Kumar Jyv, Ayas Kanta Swain, Sudeendra Kumar, Sauvagya Ranjan Sahoo, and Kamalakanta Mahapatra. 2018. Run time mitigation of performance degradation hardware Trojan attacks in network on chip. In Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI \u201918). IEEE, 738\u2013743."},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3186608.3186610"},{"key":"e_1_3_1_28_2","first-page":"1","volume-title":"Proceedings of the IEEE\/ACM International Symposium on Networks-on-Chip (NOCS)","author":"Manju R.","year":"2020","unstructured":"R. Manju, Abhijit Das, John Jose, and Prabhat Mishra. 2020. SECTAR: Secure NoC using Trojan aware routing. In Proceedings of the IEEE\/ACM International Symposium on Networks-on-Chip (NOCS). 1\u20138."},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49025-0"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69131-8"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243824"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3592798"},{"key":"e_1_3_1_33_2","first-page":"1","volume-title":"Proceedings of the 56th ACM\/IEEE Design Automation Conference (DAC \u201919)","author":"Raparti Venkata Yaswanth","year":"2019","unstructured":"Venkata Yaswanth Raparti and Sudeep Pasricha. 2019. Lightweight mitigation of hardware Trojan attacks in NoC-based manycore computing. In Proceedings of the 56th ACM\/IEEE Design Automation Conference (DAC \u201919). IEEE, 1\u20136."},{"key":"e_1_3_1_34_2","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1109\/ISVLSI.2016.25","volume-title":"Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI \u201916)","author":"Reinbrecht Cezar","year":"2016","unstructured":"Cezar Reinbrecht, Altamiro Susin, Lilian Bossuet, and Johanna Sep\u00falveda. 2016. Gossip NoC\u2013avoiding timing side-channel attacks through traffic management. In Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI \u201916). IEEE, 601\u2013606."},{"key":"e_1_3_1_35_2","first-page":"101","volume-title":"Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS \u201916)","author":"Sakalis Christos","year":"2016","unstructured":"Christos Sakalis, Carl Leonardsson, Stefanos Kaxiras, and Alberto Ros. 2016. Splash-3: A properly synchronized benchmark suite for contemporary research. In Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS \u201916). IEEE, 101\u2013111."},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3479876.3481592"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.05.139"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2021.3083289"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3479876.3481589"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2020.3003576"},{"key":"e_1_3_1_42_2","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/HOST49136.2021.9702282","volume-title":"Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST \u201921)","author":"Weerasena Hansika","year":"2021","unstructured":"Hansika Weerasena, Subodha Charles, and Prabhat Mishra. 2021. Lightweight encryption using chaffing and winnowing with all-or-nothing transform for network-on-chip architectures. In Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST \u201921). IEEE, 170\u2013180."},{"key":"e_1_3_1_43_2","doi-asserted-by":"crossref","unstructured":"Hansika Weerasena and Prabhat Mishra. 2023. Revealing CNN architectures via side-channel analysis in dataflow-based inference accelerators. arXiv:2311.00579. Retrieved from https:\/\/doi.org\/10.48550\/arXiv.2311.00579","DOI":"10.1145\/3688001"},{"key":"e_1_3_1_44_2","first-page":"1","volume-title":"Proceedings of the 25th International Symposium on Quality Electronic Design (ISQED \u201924)","author":"Weerasena Hansika","year":"2024","unstructured":"Hansika Weerasena and Prabhat Mishra. 2024a. Lightweight multicast authentication in NoC-based SoCs. In Proceedings of the 25th International Symposium on Quality Electronic Design (ISQED \u201924). IEEE, 1\u20138."},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3631117"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/225830.223990"},{"key":"e_1_3_1_47_2","first-page":"266","volume-title":"Proceedings of the International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","author":"Yu Qiaoyan","year":"2013","unstructured":"Qiaoyan Yu and Jonathan Frey. 2013. Exploiting error control approaches for hardware Trojans on network-on-chip links. In Proceedings of the International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS). 266\u2013271."},{"key":"e_1_3_1_48_2","first-page":"401","volume-title":"Proceedings of ICN","author":"Zantout Bassam","year":"2011","unstructured":"Bassam Zantout and Ramzi Haraty. 2011. I2P data communication system. In Proceedings of ICN. Citeseer, 401\u2013409."},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.21629\/JSEE.2017.01.18"}],"container-title":["ACM Journal on Emerging Technologies in Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677034","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3677034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:16Z","timestamp":1750294696000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,22]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,10,31]]}},"alternative-id":["10.1145\/3677034"],"URL":"https:\/\/doi.org\/10.1145\/3677034","relation":{},"ISSN":["1550-4832","1550-4840"],"issn-type":[{"value":"1550-4832","type":"print"},{"value":"1550-4840","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,22]]},"assertion":[{"value":"2024-02-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-03","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}