Detection of Hardware Trojan in Presence of Sneak Path in Memristive Nanocrossbar Circuits

被引:0
|
作者
Basu, Subhashree [1 ]
Kule, Malay [2 ]
Rahaman, Hafizur [3 ]
机构
[1] St Thomas Coll Engn & Technol, Dept Informat Technol, Kidderpore, India
[2] Indian Inst Engn Sci & Technol, Dept Comp Sci & Technol, Sibpur, India
[3] Indian Inst Engn Sci & Technol, Dept Informat Technol, Sibpur, India
关键词
Memristive; Sneak Path; Nano crossbar; Hardware Trojan; MEMORY;
D O I
10.1109/ISDCS52006.2021.9397908
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Memristive nano crossbar array has paved the way for high density memories but in a very low power environment. But such high density circuits face multiple problems at the time of implementation. The sneak path problem in crossbar array is one such problem which causes difficulty in distinguishing the logical states of the memristors. On the other hand, hardware Trojan causes malfunctioning of the circuit or performance degradation. If any of these are present in the nano crossbar, it is difficult to identify whether the performance degradation is due to the sneak path problem or due to that of Hardware Trojan. This paper makes a comparative study of the sneak path problem and the hardware Trojan to understand the performance difference between both. It is observed that some parameters are affected by sneak path problem but remains unaffected in presence of Hardware Trojan and vice versa. Analyzing these parameters, we can classify whether the performance degradation is due to sneak path or due to Hardware Trojan. The experimental results well establish the proposed methods of detection of hardware Trojan in presence of sneak path in memristive nano crossbar circuits.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Sneak Path Characterization in Memristor Crossbar Circuits
    Joshi, Rasika
    Acken, John M.
    INTERNATIONAL JOURNAL OF ELECTRONICS, 2021, 108 (08) : 1255 - 1272
  • [22] A security method of hardware Trojan detection using path tracking algorithm
    Huang, Der-Chen
    Hsiao, Chun-Fang
    Chang, Tin-Wei
    Chu, Ying-Yi
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)
  • [23] Hardware Trojan Detection Based on Path Feature and Support Vector Machine
    Yan, Feng
    Lan, Chen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (06) : 1921 - 1932
  • [24] A security method of hardware Trojan detection using path tracking algorithm
    Der-Chen Huang
    Chun-Fang Hsiao
    Tin-Wei Chang
    Ying-Yi Chu
    EURASIP Journal on Wireless Communications and Networking, 2022
  • [25] Hardware Trojan Detection Method for Inspecting Integrated Circuits Based on Machine Learning
    Wang, Yuze
    Liu, Peng
    Han, Xiaoxia
    Jiang, Yingtao
    PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 432 - 436
  • [26] A General Framework for Hardware Trojan Detection in Digital Circuits by Statistical Learning Algorithms
    Chen, Xiaoming
    Wang, Lin
    Wang, Yu
    Liu, Yongpan
    Yang, Huazhong
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (10) : 1633 - 1646
  • [27] Advances in Hardware Trojan Detection
    Vaidya, Jaideep
    COMPUTER, 2019, 52 (06) : 4 - 5
  • [28] Using Path Features for Hardware Trojan Detection Based on Machine Learning Techniques
    Yen, Chia-Heng
    Tsai, Jung-Che
    Wu, Kai-Chiang
    2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 638 - 645
  • [29] A study on the efficiency of hardware Trojan detection based on path-delay fingerprinting
    Nejat, Arash
    Shekarian, Seyed Mohammd Hossein
    Zamani, Morteza Saheb
    MICROPROCESSORS AND MICROSYSTEMS, 2014, 38 (03) : 246 - 252
  • [30] A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement
    Amelian, Atieh
    Borujeni, Shahram Etemadi
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (09)