Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)

<div><p>Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in...

Full description

Saved in:
Bibliographic Details
Main Author: Musharraf Hussain (17541498) (author)
Other Authors: Naveed Khan Baloach (17541501) (author), Gauhar Ali (7300334) (author), Mohammed ElAffendi (17020390) (author), Imed Ben Dhaou (17541504) (author), Syed Sajid Ullah (17541507) (author), Mueen Uddin (4903510) (author)
Published: 2023
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1864513535754633216
author Musharraf Hussain (17541498)
author2 Naveed Khan Baloach (17541501)
Gauhar Ali (7300334)
Mohammed ElAffendi (17020390)
Imed Ben Dhaou (17541504)
Syed Sajid Ullah (17541507)
Mueen Uddin (4903510)
author2_role author
author
author
author
author
author
author_facet Musharraf Hussain (17541498)
Naveed Khan Baloach (17541501)
Gauhar Ali (7300334)
Mohammed ElAffendi (17020390)
Imed Ben Dhaou (17541504)
Syed Sajid Ullah (17541507)
Mueen Uddin (4903510)
author_role author
dc.creator.none.fl_str_mv Musharraf Hussain (17541498)
Naveed Khan Baloach (17541501)
Gauhar Ali (7300334)
Mohammed ElAffendi (17020390)
Imed Ben Dhaou (17541504)
Syed Sajid Ullah (17541507)
Mueen Uddin (4903510)
dc.date.none.fl_str_mv 2023-04-08T03:00:00Z
dc.identifier.none.fl_str_mv 10.3390/mi14040828
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/Hardware_Trojan_Mitigation_Technique_in_Network-on-Chip_NoC_/24717240
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Cybersecurity and privacy
Trojan mitigation
hardware Trojan mitigation
network-on-chip
dc.title.none.fl_str_mv Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <div><p>Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in general integrated circuits. However, insufficient effort has been made for hardware Trojans (HTs) in the network-on-chip. In this study, we implement a countermeasure to congeal the network-on-chip hardware design in order to prevent changes from being made to the network-on-chip design. We propose a collaborative method which uses flit integrity and dynamic flit permutation to eliminate the hardware Trojan inserted into the router of the NoC by a disloyal employee or a third-party vendor corporation. The proposed method increases the number of received packets by up to 10% more compared to existing techniques, which contain HTs in the destination address of the flit. Compared to the runtime HT mitigation method, the proposed scheme also decreases the average latency for the hardware Trojan inserted in the flit’s header, tail, and destination field up to 14.7%, 8%, and 3%, respectively.</p><p> </p></div><h2>Other Information</h2> <p> Published in: Micromachines<br> License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/mi14040828" target="_blank">https://dx.doi.org/10.3390/mi14040828</a></p>
eu_rights_str_mv openAccess
id Manara2_7b68fe7ecf67bba001d9805fcf19f159
identifier_str_mv 10.3390/mi14040828
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/24717240
publishDate 2023
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)Musharraf Hussain (17541498)Naveed Khan Baloach (17541501)Gauhar Ali (7300334)Mohammed ElAffendi (17020390)Imed Ben Dhaou (17541504)Syed Sajid Ullah (17541507)Mueen Uddin (4903510)Information and computing sciencesCybersecurity and privacyTrojan mitigationhardware Trojan mitigationnetwork-on-chip<div><p>Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in general integrated circuits. However, insufficient effort has been made for hardware Trojans (HTs) in the network-on-chip. In this study, we implement a countermeasure to congeal the network-on-chip hardware design in order to prevent changes from being made to the network-on-chip design. We propose a collaborative method which uses flit integrity and dynamic flit permutation to eliminate the hardware Trojan inserted into the router of the NoC by a disloyal employee or a third-party vendor corporation. The proposed method increases the number of received packets by up to 10% more compared to existing techniques, which contain HTs in the destination address of the flit. Compared to the runtime HT mitigation method, the proposed scheme also decreases the average latency for the hardware Trojan inserted in the flit’s header, tail, and destination field up to 14.7%, 8%, and 3%, respectively.</p><p> </p></div><h2>Other Information</h2> <p> Published in: Micromachines<br> License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/mi14040828" target="_blank">https://dx.doi.org/10.3390/mi14040828</a></p>2023-04-08T03:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.3390/mi14040828https://figshare.com/articles/journal_contribution/Hardware_Trojan_Mitigation_Technique_in_Network-on-Chip_NoC_/24717240CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/247172402023-04-08T03:00:00Z
spellingShingle Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
Musharraf Hussain (17541498)
Information and computing sciences
Cybersecurity and privacy
Trojan mitigation
hardware Trojan mitigation
network-on-chip
status_str publishedVersion
title Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
title_full Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
title_fullStr Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
title_full_unstemmed Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
title_short Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
title_sort Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
topic Information and computing sciences
Cybersecurity and privacy
Trojan mitigation
hardware Trojan mitigation
network-on-chip