Stigmergy-Based Security for SoC Operations From Runtime Performance Degradation of SoC Components

被引:3
|
作者
Guha, Krishnendu [1 ]
Saha, Debasri [1 ]
Chakrabarti, Amlan [1 ]
机构
[1] Univ Calcutta, Dept AK Choudhury Sch Informat Technol, Kolkata, W Bengal, India
关键词
Runtime SoC security; Hardware Trojan Horses (HTH); stigmergy; HARDWARE TROJAN DETECTION; COLONY;
D O I
10.1145/3301279
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The semiconductor design industry of the embedded era has embraced the globalization strategy for system on chip (SoC) design. This involves incorporation of various SoC components or intellectual properties (IPs), procured from various third-party IP (3PIP) vendors. However, trust of an SoC is challenged when a supplied IP is counterfeit or implanted with a Hardware Trojan Horse. Both roots of untrust may result in sudden performance degradation at runtime. None of the existing hardware security approaches organize the behavior of the IPs at the low level, to ensure timely completion of SoC operations. However, real-time SoC operations are always associated with a deadline, and a deadline miss due to sudden performance degradation of any of the IPs may jeopardize mission-critical applications. We seek refuge to the stigmergic behavior exhibited in insect colonies to propose a decentralized self-aware security approach. The self-aware security modules attached with each IP works based on the Observe-Decide-Act paradigm and not only detects vulnerability but also organizes behavior of the IPs dynamically at runtime so that the high-level objective of task completion before a deadline is ensured. Experimental validation and low overhead of our proposed security modules over various benchmark IPs and crypto SoCs depict the prospects of our proposed mechanism.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] A framework for Designing a Security Operations Centre (SOC)
    Schinagl, Stef
    Schoon, Keith
    Paans, Ronald
    2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, : 2253 - 2262
  • [2] Self Aware SoC Security to counteract Delay inducing Hardware Trojans at Runtime
    Guha, Krishnendu
    Saha, Debasri
    Chakrabarti, Amlan
    2017 30TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2017 16TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID 2017), 2017, : 417 - 422
  • [3] A high-performance platform-based SoC for information security
    Wu, Min
    Zeng, Xiaoyang
    Han, Jun
    Wu, Yongyi
    Fan, Yibo
    ASP-DAC 2006: 11TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, PROCEEDINGS, 2006, : 122 - +
  • [4] Model for successful development and implementation of Cyber Security Operations Centre (SOC)
    Abd Majid, Maziana
    Ariffin, Khairul Akram Zainol
    PLOS ONE, 2021, 16 (11):
  • [5] SOC It to ‘Em: Bringing a Security Operations Center onto a University Campus
    Marquardson, Jim
    Journal of Information Systems Education, 2022, 33 (03): : 300 - 305
  • [6] Template-based runtime reconfiguration scheduling for partial reconfigurable SoC
    Chia, Li
    Shih, Chi-Sheng
    13TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2007, : 542 - +
  • [7] Stigmergy-Based Modeling to Discover Urban Activity Patterns from Positioning Data
    Alfeo, Antonio Luca
    Cimino, Mario Giovanni C. A.
    Egidi, Sara
    Lepri, Bruno
    Pentland, Alex
    Vaglini, Gigliola
    SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, 2017, 10354 : 292 - 301
  • [8] The Security of ARM TrustZone in a FPGA-Based SoC
    Benhani, E. M.
    Bossuet, L.
    Aubert, A.
    IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (08) : 1238 - 1248
  • [9] High-Performance Vision-Based Navigation on SoC FPGA for Spacecraft Proximity Operations
    Lentaris, George
    Stratakos, Ioannis
    Stamoulias, Ioannis
    Soudris, Dimitrios
    Lourakis, Manolis
    Zabulis, Xenophon
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2020, 30 (04) : 1188 - 1202
  • [10] FPGA SoC Architecture and Runtime to Prevent Hardware Trojans from Leaking Secrets
    Bloom, Gedare
    Narahari, Bhagirath
    Simha, Rahul
    Namazi, Ali
    Levy, Renato
    2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 48 - 51