Cellular Automata Based Solution for Detecting Hardware Trojan in CMPs

被引:0
|
作者
Hazra, Suvadip [1 ]
Dalui, Mamata [1 ]
机构
[1] NIT Durgapur, Durgapur 713209, W Bengal, India
关键词
Hardware Trojan; Chip Multiprocessors; Cellular automata;
D O I
10.1007/978-3-030-34152-7_49
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, Hardware Trojan threats have become inevitable due to the growing complexities of Integrated Circuits (ICs) as well as the current trend of Intellectual Property (IP) based hardware designs. An adversary can insert a Hardware Trojan during any of its life cycle phases-during the design, fabrication or even manufacturing phase. Once a Trojan is inserted into a system, it can cause an unwanted modification to system functionality which may degrade system performance or sometimes Trojans are implanted with the target to leak secret information. Once Trojans are implanted, it is hard to detect and impossible to remove it from the system as it is already fabricated into the chip. In this paper, we propose a stealthy Trojan model which affect the coherence mechanism of a Chip Multiprocessors' (CMPs) cache system by arbitrarily modifying the cache block state which in turn may leave the cache lines states as incoherent. We have evaluated the payload of such modelled Trojan and proposed a cellular automata (CA) based solution for detection of such Trojan.
引用
收藏
页码:644 / 655
页数:12
相关论文
共 50 条
  • [21] SCCA: Side-Channel Correlation Analysis for Detecting Hardware Trojan
    Liu, Yanjiang
    Zhao, Yiqiang
    He, Jiaji
    Liu, Aqiang
    Xin, Ruishan
    PROCEEDINGS OF 2017 11TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2017, : 196 - 200
  • [22] Detecting and Thwarting Hardware Trojan Attacks in Cyber-Physical Systems
    Venugopalan, Vivek
    Patterson, Cameron D.
    Shila, Devu Manikantan
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 421 - 425
  • [23] A method of implanting combinational hardware Trojan based on evolvable hardware
    Liu, Lijun
    Wang, Tao
    Wang, Xiaohan
    He, Tianyu
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 93
  • [24] Hardware Implementation of Programmable Cellular Automata Encryption Algorithm
    Anghelescu, Petre
    2012 35TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2012, : 18 - 21
  • [25] Hardware version for two-dimensional cellular automata
    Dascalu, M
    Franti, E
    Hascsi, Z
    CAS '97 PROCEEDINGS - 1997 INTERNATIONAL SEMICONDUCTOR CONFERENCE, 20TH EDITION, VOLS 1 AND 2, 1997, : 597 - 600
  • [26] Hardware Acceleration of Cellular Automata Physarum polycephalum Model
    Dourvas, Nikolaos
    Tsompanas, Michail-Antisthenis
    Sirakoulis, Georgios Ch.
    Tsalides, Philippos
    PARALLEL PROCESSING LETTERS, 2015, 25 (01)
  • [27] Evolving cellular automata for self-testing hardware
    Corno, F
    Reorda, MS
    Squillero, G
    EVOLVABLE SYSTEMS: FROM BIOLOGY TO HARDWARE, PROCEEDINGS, 2000, 1801 : 31 - 40
  • [28] Hardware modelling of cellular automata:: The Game of Life case
    Gomez-Pulido, Juan A.
    Matas-Santiago, Juan M.
    Perez-Rodriguez, Francisco
    Vega-Rodriguez, Miguel A.
    Sanchez-Perez, Juan M.
    Fernandez de Vega, Francisco
    COMPUTER AIDED SYSTEMS THEORY- EUROCAST 2007, 2007, 4739 : 589 - 595
  • [29] Cellular automata architecture for elliptic curve cryptographic hardware
    Jeon, Jun-Cheol
    Kim, Kee-Won
    Kang, Byung-Heon
    Yoo, Kee-Young
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 3, PROCEEDINGS, 2006, 3993 : 329 - 336
  • [30] Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution
    Bhunia, Swarup
    Abramovici, Miron
    Agrawal, Dakshi
    Bradley, Paul
    Hsiao, Michael S.
    Plusquellic, Jim
    Tehranipoor, Mohammad
    IEEE DESIGN & TEST, 2013, 30 (03) : 6 - 17