Cellular Automata Based Solution for Detecting Hardware Trojan in CMPs

被引:0
|
作者
Hazra, Suvadip [1 ]
Dalui, Mamata [1 ]
机构
[1] NIT Durgapur, Durgapur 713209, W Bengal, India
关键词
Hardware Trojan; Chip Multiprocessors; Cellular automata;
D O I
10.1007/978-3-030-34152-7_49
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, Hardware Trojan threats have become inevitable due to the growing complexities of Integrated Circuits (ICs) as well as the current trend of Intellectual Property (IP) based hardware designs. An adversary can insert a Hardware Trojan during any of its life cycle phases-during the design, fabrication or even manufacturing phase. Once a Trojan is inserted into a system, it can cause an unwanted modification to system functionality which may degrade system performance or sometimes Trojans are implanted with the target to leak secret information. Once Trojans are implanted, it is hard to detect and impossible to remove it from the system as it is already fabricated into the chip. In this paper, we propose a stealthy Trojan model which affect the coherence mechanism of a Chip Multiprocessors' (CMPs) cache system by arbitrarily modifying the cache block state which in turn may leave the cache lines states as incoherent. We have evaluated the payload of such modelled Trojan and proposed a cellular automata (CA) based solution for detection of such Trojan.
引用
收藏
页码:644 / 655
页数:12
相关论文
共 50 条
  • [31] A cellular learning automata based algorithm for detecting community structure in complex networks
    Zhao, Yuxin
    Jiang, Wen
    Li, Shenghong
    Ma, Yinghua
    Su, Guiyang
    Lin, Xiang
    NEUROCOMPUTING, 2015, 151 : 1216 - 1226
  • [32] A solution to the classification problem with cellular automata
    Uzuna, Arif Orhun
    Usta, Tugba
    Dundar, Enes Burak
    Korkmaz, Emin Erkan
    PATTERN RECOGNITION LETTERS, 2018, 116 : 114 - 120
  • [33] Design of Hardware Trojan Horse Based on Counter
    Liu, Huafeng
    Luo, Hongwei
    Wang, Liwei
    2011 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2011, : 1007 - 1009
  • [34] Hardware Trojan Detection Based on Image Comparison
    Sun, Chen
    Guo, Xiaohui
    Li, Lingling
    Ma, Jingjing
    Lecture Notes on Data Engineering and Communications Technologies, 2022, 80 : 979 - 986
  • [35] Hardware Trojan Detection Based on Logical Testing
    Bazzazi, Amin
    Shalmani, Mohammad Taghi Manzuri
    Hemmatyar, Ali Mohammad Afshin
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (04): : 381 - 395
  • [36] Hardware Trojan Detection Based on the Distance Discrimination
    Wang Jianxin
    Wang Boren
    Qu Ming
    Zhang Lei
    Xiao Chaoen
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 404 - 407
  • [37] Design of hardware trojan horse based on counter
    Liu, Huafeng
    Luo, Hongwei
    Wang, Liwei
    ICQR2MSE 2011 - Proceedings of 2011 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, 2011, : 1007 - 1009
  • [38] Hardware Trojan Detection Based on Signal Correlation
    Zhao, Wei
    Shen, Haihua
    Li, Huawei
    Li, Xiaowei
    2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, : 80 - 85
  • [39] Hardware Trojan Detection Based on Logical Testing
    Amin Bazzazi
    Mohammad Taghi Manzuri Shalmani
    Ali Mohammad Afshin Hemmatyar
    Journal of Electronic Testing, 2017, 33 : 381 - 395
  • [40] Cellular automata based binary arithmetic for use on self repairing, fault tolerant hardware
    Weston, James
    Lee, Peter
    NASA/ESA CONFERENCE ON ADAPTIVE HARDWARE AND SYSTEMS, PROCEEDINGS, 2007, : 732 - +