DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer

被引:0
作者
Mei, Bo [1 ]
Zhu, Zhengbin [1 ]
Li, Peijie [1 ]
Zhao, Bo [1 ]
机构
[1] PLA Informat Engn Univ, Zhengzhou 450000, Peoples R China
关键词
Computation theory - Hardware security - Malware - Memory architecture - Petri nets - Random access storage - Stochastic models;
D O I
10.1049/2024/2023349
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
System on Wafer (SoW) based on chiplets may be implanted with hardware Trojans (HTs) by untrustworthy third-party chiplet vendors. However, traditional HTs protection techniques cannot guarantee complete protection against HTs, which poses a great challenge to the hardware security of SoW. In this paper, we propose a computing architecture based on endogenous security theory-dynamic heterogeneous redundant computing architecture (DHRCA) that can tolerate and detect HTs at runtime. The security of our approach is analyzed by building a generalized stochastic coloring petri net (GSCPN) model of DHRCA. The simulation results based on the GSCPN model show that our method can improve the system security probability to 0.8690 and the system availability probability to 0.9750 in the steady state compared with typical triple-mode redundancy and runtime monitoring methods. Furthermore, the impact of different attack and defense strategies on system security of different methods is simulated and analyzed in this paper.
引用
收藏
页数:15
相关论文
共 36 条
[1]   A Cluster-Based Distributed Active Current Sensing Circuit for Hardware Trojan Detection [J].
Cao, Yuan ;
Chang, Chip-Hong ;
Chen, Shoushun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (12) :2220-2231
[2]   DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN [J].
Cassano, Luca ;
Iamundo, Mattia ;
Lopez, Tomas Antonio ;
Nazzari, Alessandro ;
Di Natale, Giorgio .
JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 129
[3]   Hardware Trojan: Threats and Emerging Solutions [J].
Chakraborty, Rajat Subhra ;
Narasimhan, Seetharam ;
Bhunia, Swarup .
2009 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP, 2009, :166-171
[4]   Security Threats and Countermeasures in Three-Dimensional Integrated Circuits [J].
Dofe, Jaya ;
Gu, Peng ;
Stow, Dylan ;
Yu, Qiaoyan ;
Kursun, Eren ;
Xie, Yuan .
PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17), 2017, :321-326
[5]   A multi-level architecture for hardware Trojan and vulnerability runtime detection and response towards cryptographic IP [J].
Dong, Zhaojie ;
Chen, Lan ;
Li, Ying .
IEICE ELECTRONICS EXPRESS, 2022, 19 (11)
[6]   Delay based hardware Trojan detection exploiting spatial correlations to suppress variations [J].
Esirci, Fatma Nur ;
Bayrakci, Alp Arslan .
INTEGRATION-THE VLSI JOURNAL, 2023, 91 :107-118
[7]   Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection [J].
Eslami, Mohammad ;
Ghasempouri, Tara ;
Pagliarini, Samuel .
PROCEEDINGS OF THE TWENTY THIRD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2022), 2022, :236-241
[8]  
Gomes Wilfred, 2022, 2022 IEEE International Solid- State Circuits Conference (ISSCC), P42, DOI 10.1109/ISSCC42614.2022.9731673
[9]  
Guimaraes Leonel Acunha, 2017, 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). Proceedings, P290, DOI 10.1109/ISVLSI.2017.58
[10]   Effective usage of redundancy to aid neutralization of hardware Trojans in Integrated Circuits [J].
Gunti, Nagendra Babu ;
Lingasubramanian, Karthikeyan .
INTEGRATION-THE VLSI JOURNAL, 2017, 59 :233-242