Partial Reconfiguration for Run-time Memory Faults and Hardware Trojan Attacks Detection

被引:0
|
作者
Li, Ying [1 ]
Chen, Lan [1 ]
Wang, Jian [1 ]
Gong, Guanfei [1 ]
机构
[1] Chinese Acad Sci, Inst Microelect, Beijing, Peoples R China
关键词
memory; fault; Hardware Trojans; detection;
D O I
10.1109/HOST54066.2022.9840090
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded memory are important components in system-on-chip, which may be crippled by aging and wear faults or Hardware Trojan attacks to compromise run-time security. The current built-in self-test and pre-silicon verification lack efficiency and flexibility to solve this problem. To this end, we address such vulnerabilities by proposing a run-time memory security detecting framework in this paper. The solution builds mainly upon a centralized security detection controller for partially reconfigurable inspection content, and a static memory wrapper to handle access conflicts and buffering testing cells. We show that a field programmable gate array prototype of the proposed framework can pursue 16 memory faults and 3 types Hardware Trojans detection with one reconfigurable partition, whereas saves 12.7% area and 2.9% power overhead compared to a static implementation. This architecture has more scalable capability with little impact on the memory accessing throughput of the original chip system in run-time detection.
引用
收藏
页码:173 / 176
页数:4
相关论文
共 50 条
  • [1] Hardware Property Checker for Run-Time Hardware Trojan Detection
    Ngo, Xuan Thuy
    Danger, Jean-Luc
    Guilley, Sylvain
    Najm, Zakaria
    Emery, Olivier
    [J]. 2015 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN (ECCTD), 2015, : 97 - 100
  • [2] Dynamic hardware plugins in an FPGA with partial run-time reconfiguration
    Horta, EL
    Lockwood, JW
    Taylor, DE
    Parlour, D
    [J]. 39TH DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2002, 2002, : 343 - 348
  • [3] Run-Time Hardware Trojan Detection Using Performance Counters
    Elnaggar, Rana
    Chakrabarty, Krishnendu
    Tahoori, Mehdi B.
    [J]. 2017 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2017,
  • [4] Viable run-time reconfiguration of hardware
    Hughes, K
    Gunther, B
    [J]. PROCEEDINGS OF THE 3RD AUSTRALASIAN COMPUTER ARCHITECTURE CONFERENCE, ACAC'98, 1998, 20 (04): : 67 - 74
  • [5] Run-time exchange of mechatronic controllers using partial hardware reconfiguration
    Danne, K
    Bobda, C
    Kalte, H
    [J]. FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2003, 2778 : 272 - 281
  • [6] Temperature Tracking: An Innovative Run-Time Approach for Hardware Trojan Detection
    Forte, Domenic
    Bao, Chongxi
    Srivastava, Ankur
    [J]. 2013 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2013, : 532 - 539
  • [7] LAOCOON: A Run-time Monitoring and Verification Approach for Hardware Trojan Detection
    Danger, Jean-Luc
    Fribourg, Laurent
    Naceur, Maha
    Kuhne, Ulrich
    [J]. 2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 269 - 276
  • [8] PCB Hardware Trojan Run-Time Detection Through Machine Learning
    Piliposyan, Gor
    Khursheed, Saqib
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (07) : 1958 - 1970
  • [9] Secure content distribution system based on run-time partial hardware reconfiguration
    Hori, Yohei
    Yokoyama, Hiroyuki
    Toda, Kenji
    [J]. 2006 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2006, : 637 - 640
  • [10] High-Level Synthesis for Run-Time Hardware Trojan Detection and Recovery
    Cui, Xiaotong
    Ma, Kun
    Shi, Liang
    Wu, Kaijie
    [J]. 2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,