Security-Aware Task Scheduling Using Untrusted Components in High-Level Synthesis

The high penetration of third-party intellectual property is accompanied with severe security issues, and thus, security constraints during task scheduling have recently been proposed for protecting multiprocessor system-on-chip systems. However, these security constraints incur significant overhead...

Full description

Bibliographic Details
Main Authors: Nan Wang, Song Chen, Jianmo Ni, Xiaofeng Ling, Yu Zhu
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8249527/
_version_ 1818331705653592064
author Nan Wang
Song Chen
Jianmo Ni
Xiaofeng Ling
Yu Zhu
author_facet Nan Wang
Song Chen
Jianmo Ni
Xiaofeng Ling
Yu Zhu
author_sort Nan Wang
collection DOAJ
description The high penetration of third-party intellectual property is accompanied with severe security issues, and thus, security constraints during task scheduling have recently been proposed for protecting multiprocessor system-on-chip systems. However, these security constraints incur significant overheads in terms of the schedule length and design cost. In this paper, the multi-dimensional design optimization space (schedule length, design cost, area, and security) is explored, and two task scheduling approaches in the context of security constraints are proposed. In resource-constrained task scheduling approach, the maximum clique of a vendor violation graph is accurately calculated, enabling a minimized number of security constraint violations under the vendor constraint. In addition, task scheduling is conducted alongside vendor assignment to optimize the schedule length. In performance-constrained task scheduling approach, a max-flow min-cut-based task clustering method is first proposed to iteratively reduce the schedule length of the graph containing all critical paths. Then, vendor assignment is performed by solving a graph coloring problem, and all tasks are finally scheduled with an optimization of hardware resources. The experimental results demonstrate that our resource-constrained task scheduling approach reduces the schedule length by 28.2% with all security constraints satisfied; besides, 18.0% cores are saved by our performance-constrained task scheduling approach.
first_indexed 2024-12-13T13:24:06Z
format Article
id doaj.art-67e1aa951cac4a3b9006c87b6dd82c56
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-13T13:24:06Z
publishDate 2018-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-67e1aa951cac4a3b9006c87b6dd82c562022-12-21T23:44:21ZengIEEEIEEE Access2169-35362018-01-016156631567810.1109/ACCESS.2018.27903928249527Security-Aware Task Scheduling Using Untrusted Components in High-Level SynthesisNan Wang0https://orcid.org/0000-0002-4369-0115Song Chen1Jianmo Ni2Xiaofeng Ling3https://orcid.org/0000-0002-1107-6305Yu Zhu4School of Information Science and Engineering, East China University of Science and Technology, Shanghai, ChinaSchool of Information Science and Technology, University of Science and Technology of China, Hefei, ChinaDepartment of Computer Science and Engineering, University of California at San Diego, La Jolla, CA, USASchool of Information Science and Engineering, East China University of Science and Technology, Shanghai, ChinaSchool of Information Science and Engineering, East China University of Science and Technology, Shanghai, ChinaThe high penetration of third-party intellectual property is accompanied with severe security issues, and thus, security constraints during task scheduling have recently been proposed for protecting multiprocessor system-on-chip systems. However, these security constraints incur significant overheads in terms of the schedule length and design cost. In this paper, the multi-dimensional design optimization space (schedule length, design cost, area, and security) is explored, and two task scheduling approaches in the context of security constraints are proposed. In resource-constrained task scheduling approach, the maximum clique of a vendor violation graph is accurately calculated, enabling a minimized number of security constraint violations under the vendor constraint. In addition, task scheduling is conducted alongside vendor assignment to optimize the schedule length. In performance-constrained task scheduling approach, a max-flow min-cut-based task clustering method is first proposed to iteratively reduce the schedule length of the graph containing all critical paths. Then, vendor assignment is performed by solving a graph coloring problem, and all tasks are finally scheduled with an optimization of hardware resources. The experimental results demonstrate that our resource-constrained task scheduling approach reduces the schedule length by 28.2% with all security constraints satisfied; besides, 18.0% cores are saved by our performance-constrained task scheduling approach.https://ieeexplore.ieee.org/document/8249527/Hardware Trojan3PIPsecuritytask schedulinghigh-level synthesis
spellingShingle Nan Wang
Song Chen
Jianmo Ni
Xiaofeng Ling
Yu Zhu
Security-Aware Task Scheduling Using Untrusted Components in High-Level Synthesis
IEEE Access
Hardware Trojan
3PIP
security
task scheduling
high-level synthesis
title Security-Aware Task Scheduling Using Untrusted Components in High-Level Synthesis
title_full Security-Aware Task Scheduling Using Untrusted Components in High-Level Synthesis
title_fullStr Security-Aware Task Scheduling Using Untrusted Components in High-Level Synthesis
title_full_unstemmed Security-Aware Task Scheduling Using Untrusted Components in High-Level Synthesis
title_short Security-Aware Task Scheduling Using Untrusted Components in High-Level Synthesis
title_sort security aware task scheduling using untrusted components in high level synthesis
topic Hardware Trojan
3PIP
security
task scheduling
high-level synthesis
url https://ieeexplore.ieee.org/document/8249527/
work_keys_str_mv AT nanwang securityawaretaskschedulingusinguntrustedcomponentsinhighlevelsynthesis
AT songchen securityawaretaskschedulingusinguntrustedcomponentsinhighlevelsynthesis
AT jianmoni securityawaretaskschedulingusinguntrustedcomponentsinhighlevelsynthesis
AT xiaofengling securityawaretaskschedulingusinguntrustedcomponentsinhighlevelsynthesis
AT yuzhu securityawaretaskschedulingusinguntrustedcomponentsinhighlevelsynthesis