Affiliation:
1. University of Calcutta, India
Abstract
The semiconductor design industry of the embedded era has embraced the globalization strategy for system on chip (SoC) design. This involves incorporation of various SoC components or intellectual properties (IPs), procured from various third-party IP (3PIP) vendors. However, trust of an SoC is challenged when a supplied IP is counterfeit or implanted with a Hardware Trojan Horse. Both roots of untrust may result in sudden performance degradation at runtime. None of the existing hardware security approaches organize the behavior of the IPs at the low level, to ensure timely completion of SoC operations. However, real-time SoC operations are always associated with a deadline, and a deadline miss due to sudden performance degradation of any of the IPs may jeopardize mission-critical applications. We seek refuge to the stigmergic behavior exhibited in insect colonies to propose a decentralized self-aware security approach. The self-aware security modules attached with each IP works based on the Observe-Decide-Act paradigm and not only detects vulnerability but also organizes behavior of the IPs dynamically at runtime so that the high-level objective of task completion before a deadline is ensured. Experimental validation and low overhead of our proposed security modules over various benchmark IPs and crypto SoCs depict the prospects of our proposed mechanism.
Funder
Department of Science and Technology, Government of India, INSPIRE Fellowship
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture,Software
Reference47 articles.
1. System-level protection and hardware Trojan detection using weighted voting
2. Hardware Trojan Attacks: Threat Analysis and Countermeasures
3. Defense Science Board. 2005. Defense Science Board Task Force on High Performance Microchip Supply. Available at https://www.acq.osd.mil/dsb/reports/2000s/ada435563.pdf. Defense Science Board. 2005. Defense Science Board Task Force on High Performance Microchip Supply. Available at https://www.acq.osd.mil/dsb/reports/2000s/ada435563.pdf.
4. New methods to color the vertices of a graph
5. S. Camazine J. L. Deneubourg N. R. Franks J. Sneyd G. Theraulaz and E. Bonabeau. 2001. Self Organization in Biological Systems. Princeton University Press Princeton NJ. S. Camazine J. L. Deneubourg N. R. Franks J. Sneyd G. Theraulaz and E. Bonabeau. 2001. Self Organization in Biological Systems. Princeton University Press Princeton NJ.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Handling Power Draining Attacks;Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms;2021
2. Counteracting Active Attacks;Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms;2021
3. Bypassing Passive Attacks;Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms;2021
4. Introduction to Hardware Security for FPGA Based Systems;Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms;2021
5. Dynamic power-aware scheduling of real-time tasks for FPGA-based cyber physical systems against power draining hardware trojan attacks;The Journal of Supercomputing;2020-02-13