Access the full text.
Sign up today, get DeepDyve free for 14 days.
V. Isaeva (2012)
Self-organization in biological systemsBiology Bulletin, 39
Xiaotong Cui, Kaijie Wu, Tongquan Wei, E. Sha (2016)
Worst-Case Finish Time Analysis for DAG-Based Applications in the Presence of Transient FaultsJournal of Computer Science and Technology, 31
Alejandro Cornejo, A. Dornhaus, N. Lynch, R. Nagpal (2014)
Task Allocation in Ant Colonies
Krishnendu Guha, Debasri Saha, A. Chakrabarti (2015)
RTNA: Securing SOC architectures from confidentiality attacks at runtime using ART1 neural networks2015 19th International Symposium on VLSI Design and Test
Daniel Brélaz (1979)
New methods to color the vertices of a graphCommun. ACM, 22
Hany Amin, Y. Alkabani, G. Selim (2013)
System-level protection and hardware Trojan detection using weighted voting☆Journal of Advanced Research, 5
R. Falcon, M. Almeida, A. Nayak (2010)
A binary Particle Swarm Optimization approach to fault diagnosis in parallel and distributed systemsIEEE Congress on Evolutionary Computation
A. Sengupta, Saumya Bhadauria, S. Mohanty (2017)
TL-HLS: Methodology for Low Cost Hardware Trojan Security Aware Scheduling With Optimal Loop Unrolling Factor During High Level SynthesisIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36
(2018)
ZynQ-7000 SoC Technical Reference Manual UG585
S. Bhunia, M. Hsiao, Mainak Banga, S. Narasimhan (2014)
Hardware Trojan Attacks: Threat Analysis and CountermeasuresProceedings of the IEEE, 102
Xin-She Yang, S. Deb (2009)
Cuckoo Search via Lévy flights2009 World Congress on Nature & Biologically Inspired Computing (NaBIC)
T. Kim, R. Persaud, C. Kim (2007)
Silicon Odometer: An On-Chip Reliability Monitor for Measuring Frequency Degradation of Digital Circuits2007 IEEE Symposium on VLSI Circuits
Jeyavijayan Rajendran, Huan Zhang, O. Sinanoglu, R. Karri (2013)
High-level synthesis for security and trust2013 IEEE 19th International On-Line Testing Symposium (IOLTS)
S. Sarma, N. Dutt, Puneet Gupta, N. Venkatasubramanian, A. Nicolau (2015)
CyberPhysical-System-On-Chip (CPSoC): A self-aware MPSoC paradigm with cross-layer virtual sensing and actuation2015 Design, Automation & Test in Europe Conference & Exhibition (DATE)
D. McIntyre, F. Wolff, C. Papachristou, S. Bhunia (2009)
Dynamic evaluation of hardware trust2009 IEEE International Workshop on Hardware-Oriented Security and Trust
(2013)
International Technology Roadmap for Semiconductors Report
Ujjwal Guin, Daniel DiMase, M. Tehranipoor (2014)
Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges AheadJournal of Electronic Testing, 30
(2016)
OpenCore Projects (Crypto Core Benchmarks)
S. Camazine, J. Deneubourg, N. Franks, J. Sneyd, G. Theraulaz (2001)
Self-Organization in Biological Systems
R. Chakraborty, F. Wolff, Somnath Paul, C. Papachristou, S. Bhunia (2009)
MERO: A Statistical Approach for Hardware Trojan Detection
T. H. Kim, R. Persaud, C. H. Kim (2008)
Silicon odometer: An on-chip reliability monitor for measuring frequency degradation of digital circuitsIEEE Journal of Solid-State Circuits, 43
Chandra Suresh, S. Ozev, O. Sinanoglu (2015)
Adaptive Generation of Unique IDs for Digital Chips through Analog ExcitationACM Trans. Design Autom. Electr. Syst., 20
K. Xiao, Xuehui Zhang, M. Tehranipoor (2013)
A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits DelayIEEE Design & Test, 30
S. Narasimhan, Dongdong Du, R. Chakraborty, Somnath Paul, F. Wolff, C. Papachristou, K. Roy, S. Bhunia (2013)
Hardware Trojan Detection by Multiple-Parameter Side-Channel AnalysisIEEE Transactions on Computers, 62
R. Chakraborty, S. Bhunia (2009)
HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware ProtectionIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 28
Xuehui Zhang, K. Xiao, M. Tehranipoor (2012)
Path-delay fingerprinting for identification of recovered ICs2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)
Eric Love, Yier Jin, Y. Makris (2012)
Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module AcquisitionIEEE Transactions on Information Forensics and Security, 7
(2005)
Defense Science Board Task Force on High Performance Microchip Supply
J. Keane, Xiaofei Wang, P. Jain, C. Kim (2014)
On-Chip Silicon Odometers for Circuit Aging Characterization
F. Heylighen (2016)
Stigmergy as a universal coordination mechanism I: Definition and componentsCognitive Systems Research, 38
(2012)
Reports of Counterfeit Parts Quadruple Since 2009, Challenging US Defense Industry and National Security
C. Liu, J. Rajendran, C. Yang, R. Karri (2013)
Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task schedulingProceedings of the 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS’13), 2013
Krishnendu Guha, Debasri Saha, A. Chakrabarti (2017)
Self Aware SoC Security to Counteract Delay Inducing Hardware Trojans at Runtime2017 30th International Conference on VLSI Design and 2017 16th International Conference on Embedded Systems (VLSID)
J. Rajendran, O. Sinanoglu, R. Karri (2016)
Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis ApproachIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 24
Chen Liu, Jeyavijayan Rajendran, Chengmo Yang, R. Karri (2013)
Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security- Driven Task SchedulingIEEE Transactions on Emerging Topics in Computing, 2
A. Teske, R. Falcon, A. Nayak (2015)
Efficient detection of faulty nodes with cuckoo search in t-diagnosable systemsAppl. Soft Comput., 29
M. Pecht, S. Tiku (2006)
Bogus: electronic manufacturing and consumers confront a rising tide of counterfeit electronicsIEEE Spectrum, 43
James Kennedy, Russell Eberhart (2002)
Particle swarm optimizationProceedings of ICNN'95 - International Conference on Neural Networks, 4
Justin Werfel, Kirstin Petersen, R. Nagpal (2014)
Designing Collective Behavior in a Termite-Inspired Robot Construction TeamScience, 343
Xiaotong Cui, K. Ma, Liang Shi, Kaijie Wu (2014)
High-level synthesis for run-time hardware Trojan detection and recovery2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)
R. Chakraborty, S. Bhunia (2011)
Security Against Hardware Trojan Attacks Using Key-Based Design ObfuscationJournal of Electronic Testing, 27
G. Theraulaz, E. Bonabeau, J. Deneubourg (1998)
Response threshold reinforcements and division of labour in insect societiesProceedings of the Royal Society of London. Series B: Biological Sciences, 265
A. Dornhaus, Jo-anne Holley, Victoria Pook, G. Worswick., N. Franks (2008)
Why do not all workers work? Colony size and workload during emigrations in the ant Temnothorax albipennisBehavioral Ecology and Sociobiology, 63
M. Dorigo, V. Maniezzo, A. Colorni (1996)
Ant system: optimization by a colony of cooperating agentsIEEE transactions on systems, man, and cybernetics. Part B, Cybernetics : a publication of the IEEE Systems, Man, and Cybernetics Society, 26 1
Challenging US Defense Industry and National Security
L. Abdallah, H. Stratigopoulos, S. Mir, J. Altet (2013)
Defect-oriented non-intrusive RF test using on-chip temperature sensors2013 IEEE 31st VLSI Test Symposium (VTS)
Yu Zheng, Xinmu Wang, S. Bhunia (2015)
SACCI: Scan-Based Characterization Through Clock Phase Sweep for Counterfeit Chip DetectionIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 23
S. Ghosh, D. Chowdhury (2015)
Preventing fault attack on stream cipher using randomization2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
Krishnendu Guha, Debasri Saha, A. Chakrabarti (2017)
Real-Time SoC Security against Passive Threats Using Crypsis Behavior of GeckosACM Journal on Emerging Technologies in Computing Systems (JETC), 13
G. Suh, S. Devadas (2007)
Physical Unclonable Functions for Device Authentication and Secret Key Generation2007 44th ACM/IEEE Design Automation Conference
Kaushik Chatterjee, D. Das (2007)
Semiconductor Manufacturers' Efforts to Improve Trust in the Electronic Part Supply ChainIEEE Transactions on Components and Packaging Technologies, 30
The semiconductor design industry of the embedded era has embraced the globalization strategy for system on chip (SoC) design. This involves incorporation of various SoC components or intellectual properties (IPs), procured from various third-party IP (3PIP) vendors. However, trust of an SoC is challenged when a supplied IP is counterfeit or implanted with a Hardware Trojan Horse. Both roots of untrust may result in sudden performance degradation at runtime. None of the existing hardware security approaches organize the behavior of the IPs at the low level, to ensure timely completion of SoC operations. However, real-time SoC operations are always associated with a deadline, and a deadline miss due to sudden performance degradation of any of the IPs may jeopardize mission-critical applications. We seek refuge to the stigmergic behavior exhibited in insect colonies to propose a decentralized self-aware security approach. The self-aware security modules attached with each IP works based on the Observe-Decide-Act paradigm and not only detects vulnerability but also organizes behavior of the IPs dynamically at runtime so that the high-level objective of task completion before a deadline is ensured. Experimental validation and low overhead of our proposed security modules over various benchmark IPs and crypto SoCs depict the prospects of our proposed mechanism.
ACM Transactions on Embedded Computing Systems (TECS) – Association for Computing Machinery
Published: Mar 18, 2019
Keywords: Hardware Trojan Horses (HTH)
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.