2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) 2013
DOI: 10.1109/dft.2013.6653617
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting error control approaches for Hardware Trojans on Network-on-Chip links

Abstract: We exploit transient and permanent error control methods to address Hardware Trojan (HT) issues in Network-on Chip (NoC) links. The use of hardware-efficient error control methods on NoC links has the potential to reduce the overall hardware cost for security protection, with respect to cryptographic-based rerouting algorithms. An error control coding method for transient errors is used to detect the HT induced link errors. Regarding the faulty links as permanently failed interconnects, we propose to reshuffle… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
9
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(10 citation statements)
references
References 27 publications
(25 reference statements)
1
9
0
Order By: Relevance
“…Run-time hardware Trojan detection approaches can modify the target structure they aim to protect [ 22 ]. Similarly, they can employ multiple modular redundancies at the software level to perform a task even with malicious hardware [ 23 ]. Test-time approaches employ functional verification [ 22 ] and side channel measurements [ 24 , 25 ].…”
Section: Related Workmentioning
confidence: 99%
“…Run-time hardware Trojan detection approaches can modify the target structure they aim to protect [ 22 ]. Similarly, they can employ multiple modular redundancies at the software level to perform a task even with malicious hardware [ 23 ]. Test-time approaches employ functional verification [ 22 ] and side channel measurements [ 24 , 25 ].…”
Section: Related Workmentioning
confidence: 99%
“…In this four inputs are given which are randomly selected data bits form packets. The motivation for adopting this Trojan model was taken from Yu, Q. and Frey [11].…”
Section: B Activation Mechanism Of Trojanmentioning
confidence: 99%
“…It can be implemented in NoC NI to prevent covert backdoor activation and reduce the chance of a successful side-channel attack [23]. In [24], Yu and Frey exploit transient and permanent error control methods to address HT issues in NoC links, improving the network average latency by up to 44.7% over the rerouting approach.…”
Section: B Hardware-based Techniquesmentioning
confidence: 99%