Cellular Automata Based Solution for Detecting Hardware Trojan in CMPs

被引:0
|
作者
Hazra, Suvadip [1 ]
Dalui, Mamata [1 ]
机构
[1] NIT Durgapur, Durgapur 713209, W Bengal, India
关键词
Hardware Trojan; Chip Multiprocessors; Cellular automata;
D O I
10.1007/978-3-030-34152-7_49
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, Hardware Trojan threats have become inevitable due to the growing complexities of Integrated Circuits (ICs) as well as the current trend of Intellectual Property (IP) based hardware designs. An adversary can insert a Hardware Trojan during any of its life cycle phases-during the design, fabrication or even manufacturing phase. Once a Trojan is inserted into a system, it can cause an unwanted modification to system functionality which may degrade system performance or sometimes Trojans are implanted with the target to leak secret information. Once Trojans are implanted, it is hard to detect and impossible to remove it from the system as it is already fabricated into the chip. In this paper, we propose a stealthy Trojan model which affect the coherence mechanism of a Chip Multiprocessors' (CMPs) cache system by arbitrarily modifying the cache block state which in turn may leave the cache lines states as incoherent. We have evaluated the payload of such modelled Trojan and proposed a cellular automata (CA) based solution for detection of such Trojan.
引用
收藏
页码:644 / 655
页数:12
相关论文
共 50 条
  • [1] A cellular automata based self-correcting protocol processor for scalable CMPs
    Dalui, Mamata
    Sikdar, Biplab K.
    MICROELECTRONICS JOURNAL, 2017, 62 : 108 - 119
  • [2] Programmable cellular automata based Montgomery hardware architecture
    Jeon, Jun-Cheol
    Yoo, Kee-Young
    APPLIED MATHEMATICS AND COMPUTATION, 2007, 186 (01) : 915 - 922
  • [3] A Novel Approach to Detecting Hardware Trojan Horses
    Zhang, Jia-lin
    Fang, Lei
    Li, Lei
    Zhang, Zi-xuan
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 43 - 46
  • [4] Hardware Implementation of a Crowd Evacuation Model Based on Cellular Automata
    Georgoudas, Ioakeim G.
    Sirakoulis, Georgios C.
    Andreadis, Ioannis T.
    PEDESTRIAN AND EVACUATION DYNAMICS 2008, 2010, : 451 - 463
  • [5] Cellular Automata Based Hardware Accelerator for Parallel Maze Routing
    Saurabh, Shashank
    Lin, Kuen-Wey
    Li, Yih-Lang
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS FOR SCIENCE AND ENGINEERING (IEEE-ICAMSE 2016), 2016, : 680 - 683
  • [6] Elliptic curve based hardware architecture using cellular automata
    Jeon, Jun-Cheol
    Yoo, Kee-Young
    MATHEMATICS AND COMPUTERS IN SIMULATION, 2008, 79 (04) : 1197 - 1203
  • [7] A Start to Fail Frequency Technique for Detecting Hardware Trojan
    Durai, Sharmila
    Kumar, Prasanna
    Ramasamy, Srinivasan
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 621 - 631
  • [8] Cellular Automata Hardware Implementations - an Overview
    Dascalu, Monica
    ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2016, 19 (04): : 360 - 368
  • [9] An efficient encoding algorithm for image compression hardware based on cellular automata
    Bhattacharjee, S
    Raghavendra, U
    Chowdhury, DR
    Chaudhuri, PP
    3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING, PROCEEDINGS, 1996, : 239 - 244
  • [10] On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis
    Karimi, Naghmeh
    Danger, Jean-Luc
    Guilley, Sylvain
    2018 IEEE 24TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2018), 2018, : 281 - 286