Detection of Hardware Trojan in Presence of Sneak Path in Memristive Nanocrossbar Circuits

被引:0
|
作者
Basu, Subhashree [1 ]
Kule, Malay [2 ]
Rahaman, Hafizur [3 ]
机构
[1] St Thomas Coll Engn & Technol, Dept Informat Technol, Kidderpore, India
[2] Indian Inst Engn Sci & Technol, Dept Comp Sci & Technol, Sibpur, India
[3] Indian Inst Engn Sci & Technol, Dept Informat Technol, Sibpur, India
关键词
Memristive; Sneak Path; Nano crossbar; Hardware Trojan; MEMORY;
D O I
10.1109/ISDCS52006.2021.9397908
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Memristive nano crossbar array has paved the way for high density memories but in a very low power environment. But such high density circuits face multiple problems at the time of implementation. The sneak path problem in crossbar array is one such problem which causes difficulty in distinguishing the logical states of the memristors. On the other hand, hardware Trojan causes malfunctioning of the circuit or performance degradation. If any of these are present in the nano crossbar, it is difficult to identify whether the performance degradation is due to the sneak path problem or due to that of Hardware Trojan. This paper makes a comparative study of the sneak path problem and the hardware Trojan to understand the performance difference between both. It is observed that some parameters are affected by sneak path problem but remains unaffected in presence of Hardware Trojan and vice versa. Analyzing these parameters, we can classify whether the performance degradation is due to sneak path or due to Hardware Trojan. The experimental results well establish the proposed methods of detection of hardware Trojan in presence of sneak path in memristive nano crossbar circuits.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Formal Verification for Hardware Trojan Detection
    Ponugoti, Kushal Kumar
    ProQuest Dissertations and Theses Global, 2023,
  • [42] Review on Hardware Trojan Detection Techniques
    R. Naveenkumar
    N. M. Sivamangai
    A. Napolean
    S. Sridevi Sathayapriya
    National Academy Science Letters, 2023, 46 : 521 - 524
  • [43] Hardware Trojan Detection Based on SRC
    Sun, Chen
    Cheng, Liye
    Wang, Liwei
    Huang, Yun
    2020 35TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2020, : 472 - 475
  • [44] Smart Hardware Trojan Detection System
    Alkhazendar, Iyad
    Zubair, Mohammed
    Qidwai, Uvais
    INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 3, 2023, 544 : 791 - 806
  • [45] A Survey on Hardware Trojan Detection Techniques
    Bhasin, Shivam
    Regazzoni, Francesco
    2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 2021 - 2024
  • [46] Towards a Hardware Trojan Detection Cycle
    Dabrowski, Adrian
    Hobel, Heidelinde
    Ullrich, Johanna
    Krombholz, Katharina
    Weippl, Edgar
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 287 - 294
  • [47] Hardware Trojan Detection Methodology for FPGA
    Al-Anwar, Amr
    Alkabani, Yousra
    El-Kharashi, M. Watheq
    Bedour, Hassan
    2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 177 - 182
  • [48] Introduction to Hardware Trojan Detection Methods
    Francq, Julien
    Frick, Florian
    2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 770 - 775
  • [49] Review on Hardware Trojan Detection Techniques
    Naveenkumar, R.
    Sivamangai, N. M.
    Napolean, A.
    Sathayapriya, S. Sridevi
    NATIONAL ACADEMY SCIENCE LETTERS-INDIA, 2023, 46 (06): : 521 - 524
  • [50] A Survey of Hardware Trojan Taxonomy and Detection
    Tehranipoor, Mohammad
    Koushanfar, Farinaz
    IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01): : 10 - 25