Detection of Hardware Trojan in Presence of Sneak Path in Memristive Nanocrossbar Circuits

被引:0
|
作者
Basu, Subhashree [1 ]
Kule, Malay [2 ]
Rahaman, Hafizur [3 ]
机构
[1] St Thomas Coll Engn & Technol, Dept Informat Technol, Kidderpore, India
[2] Indian Inst Engn Sci & Technol, Dept Comp Sci & Technol, Sibpur, India
[3] Indian Inst Engn Sci & Technol, Dept Informat Technol, Sibpur, India
关键词
Memristive; Sneak Path; Nano crossbar; Hardware Trojan; MEMORY;
D O I
10.1109/ISDCS52006.2021.9397908
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Memristive nano crossbar array has paved the way for high density memories but in a very low power environment. But such high density circuits face multiple problems at the time of implementation. The sneak path problem in crossbar array is one such problem which causes difficulty in distinguishing the logical states of the memristors. On the other hand, hardware Trojan causes malfunctioning of the circuit or performance degradation. If any of these are present in the nano crossbar, it is difficult to identify whether the performance degradation is due to the sneak path problem or due to that of Hardware Trojan. This paper makes a comparative study of the sneak path problem and the hardware Trojan to understand the performance difference between both. It is observed that some parameters are affected by sneak path problem but remains unaffected in presence of Hardware Trojan and vice versa. Analyzing these parameters, we can classify whether the performance degradation is due to sneak path or due to Hardware Trojan. The experimental results well establish the proposed methods of detection of hardware Trojan in presence of sneak path in memristive nano crossbar circuits.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] How Logic Masking Can Improve Path Delay Analysis for Hardware Trojan Detection
    Nejat, Arash
    Hely, David
    Beroulle, Vincent
    PROCEEDINGS OF THE 34TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2016, : 424 - 427
  • [32] Golden IC free Methodology for Hardware Trojan Detection using Symmetric Path Delays
    Vaikuntapu, Ramakrishna
    Bhargava, Lava
    Sahula, Vineet
    2016 20TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2016,
  • [33] Golden IC free methodology for hardware Trojan detection using symmetric path delays
    2016, Institute of Electrical and Electronics Engineers Inc., United States
  • [34] Hardware Trojan Detection using Path Delay Order Encoding with Process Variation Tolerance
    Cui, Xiaotong
    Wu, Kaijie
    Karri, Ramesh
    2018 23RD IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2018,
  • [35] Reusing Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection
    Nejat, Arash
    Hely, David
    Beroulle, Vincent
    2016 IEEE 22ND INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS), 2016, : 191 - 192
  • [36] Hardware Trojan Detection Based on Correlated Path Delays in Defiance of Variations with Spatial Correlations
    Esirci, Fatma Nur
    Bayrakci, Alp Arslan
    PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 163 - 168
  • [37] Survey of Hardware Trojan Threats and Detection
    Hayashi, Yuichi
    Kawamura, Shinichi
    PROCEEDINGS OF THE 2020 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC EUROPE), 2020,
  • [38] Survey: Hardware Trojan Detection for Netlist
    Yang, Yipei
    Ye, Jing
    Cao, Yuan
    Zhang, Jiliang
    Li, Xiaowei
    Li, Huawei
    Hu, Yu
    2020 IEEE 29TH ASIAN TEST SYMPOSIUM (ATS), 2020, : 48 - 53
  • [39] Character Reassignment for Hardware Trojan Detection
    Waller, Noah
    Nauman, Hunter
    Taylor, Derek
    Del Carmen, Rafael
    Di, Jia
    2021 IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2021, : 861 - 864
  • [40] Classification of Hardware Trojan Detection Techniques
    Moein, Samer
    Subramnian, Jayaram
    Gulliver, T. Aaron
    Gebali, Fayez
    El-Kharashi, M. Watheq
    2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 357 - 362