Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
<div><p>Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , , , , , |
| Published: |
2023
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1864513535754633216 |
|---|---|
| author | Musharraf Hussain (17541498) |
| author2 | Naveed Khan Baloach (17541501) Gauhar Ali (7300334) Mohammed ElAffendi (17020390) Imed Ben Dhaou (17541504) Syed Sajid Ullah (17541507) Mueen Uddin (4903510) |
| author2_role | author author author author author author |
| author_facet | Musharraf Hussain (17541498) Naveed Khan Baloach (17541501) Gauhar Ali (7300334) Mohammed ElAffendi (17020390) Imed Ben Dhaou (17541504) Syed Sajid Ullah (17541507) Mueen Uddin (4903510) |
| author_role | author |
| dc.creator.none.fl_str_mv | Musharraf Hussain (17541498) Naveed Khan Baloach (17541501) Gauhar Ali (7300334) Mohammed ElAffendi (17020390) Imed Ben Dhaou (17541504) Syed Sajid Ullah (17541507) Mueen Uddin (4903510) |
| dc.date.none.fl_str_mv | 2023-04-08T03:00:00Z |
| dc.identifier.none.fl_str_mv | 10.3390/mi14040828 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/journal_contribution/Hardware_Trojan_Mitigation_Technique_in_Network-on-Chip_NoC_/24717240 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Information and computing sciences Cybersecurity and privacy Trojan mitigation hardware Trojan mitigation network-on-chip |
| dc.title.none.fl_str_mv | Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) |
| dc.type.none.fl_str_mv | Text Journal contribution info:eu-repo/semantics/publishedVersion text contribution to journal |
| description | <div><p>Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in general integrated circuits. However, insufficient effort has been made for hardware Trojans (HTs) in the network-on-chip. In this study, we implement a countermeasure to congeal the network-on-chip hardware design in order to prevent changes from being made to the network-on-chip design. We propose a collaborative method which uses flit integrity and dynamic flit permutation to eliminate the hardware Trojan inserted into the router of the NoC by a disloyal employee or a third-party vendor corporation. The proposed method increases the number of received packets by up to 10% more compared to existing techniques, which contain HTs in the destination address of the flit. Compared to the runtime HT mitigation method, the proposed scheme also decreases the average latency for the hardware Trojan inserted in the flit’s header, tail, and destination field up to 14.7%, 8%, and 3%, respectively.</p><p> </p></div><h2>Other Information</h2> <p> Published in: Micromachines<br> License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/mi14040828" target="_blank">https://dx.doi.org/10.3390/mi14040828</a></p> |
| eu_rights_str_mv | openAccess |
| id | Manara2_7b68fe7ecf67bba001d9805fcf19f159 |
| identifier_str_mv | 10.3390/mi14040828 |
| network_acronym_str | Manara2 |
| network_name_str | Manara2 |
| oai_identifier_str | oai:figshare.com:article/24717240 |
| publishDate | 2023 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)Musharraf Hussain (17541498)Naveed Khan Baloach (17541501)Gauhar Ali (7300334)Mohammed ElAffendi (17020390)Imed Ben Dhaou (17541504)Syed Sajid Ullah (17541507)Mueen Uddin (4903510)Information and computing sciencesCybersecurity and privacyTrojan mitigationhardware Trojan mitigationnetwork-on-chip<div><p>Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in general integrated circuits. However, insufficient effort has been made for hardware Trojans (HTs) in the network-on-chip. In this study, we implement a countermeasure to congeal the network-on-chip hardware design in order to prevent changes from being made to the network-on-chip design. We propose a collaborative method which uses flit integrity and dynamic flit permutation to eliminate the hardware Trojan inserted into the router of the NoC by a disloyal employee or a third-party vendor corporation. The proposed method increases the number of received packets by up to 10% more compared to existing techniques, which contain HTs in the destination address of the flit. Compared to the runtime HT mitigation method, the proposed scheme also decreases the average latency for the hardware Trojan inserted in the flit’s header, tail, and destination field up to 14.7%, 8%, and 3%, respectively.</p><p> </p></div><h2>Other Information</h2> <p> Published in: Micromachines<br> License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/mi14040828" target="_blank">https://dx.doi.org/10.3390/mi14040828</a></p>2023-04-08T03:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.3390/mi14040828https://figshare.com/articles/journal_contribution/Hardware_Trojan_Mitigation_Technique_in_Network-on-Chip_NoC_/24717240CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/247172402023-04-08T03:00:00Z |
| spellingShingle | Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) Musharraf Hussain (17541498) Information and computing sciences Cybersecurity and privacy Trojan mitigation hardware Trojan mitigation network-on-chip |
| status_str | publishedVersion |
| title | Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) |
| title_full | Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) |
| title_fullStr | Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) |
| title_full_unstemmed | Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) |
| title_short | Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) |
| title_sort | Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) |
| topic | Information and computing sciences Cybersecurity and privacy Trojan mitigation hardware Trojan mitigation network-on-chip |