HAPMAD: Hardware-Based Authentication Platform for Malicious Activity Detection in Digital Circuits

被引:1
作者
Koneru, Venkata Raja Ramchandar [1 ]
Teja, Bikki Krishna [1 ]
Reddy, Kallam Dinesh Babu [1 ]
GnanaSwaroop, Makam V. [1 ]
Ramanidharan, Bharath [2 ]
Mohankumar, N. [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
[2] Robert Bosch Engn & Business Solut Ltd, Bengaluru, India
来源
INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, INDIA 2017 | 2018年 / 672卷
关键词
Hardware security; Hardware trojans; Voting methods; Delay arcs;
D O I
10.1007/978-981-10-7512-4_60
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Hardware Trojans pose a major threat to the security of many industries and government agencies. This paper proposes a non-destructive method for detection of Hardware Trojans named HAPMAD-Hardware-Based Authentication Platform for Malicious Activity Detection in Digital Circuits using a combination of enhanced voting algorithm and hybrid voting algorithm (power and time analysis). Detecting a hardware Trojan is a cumbersome task. In most cases, the hardware Trojan can be detected only by activating it or by magnifying the Trojan activity. The detection efficiency using enhanced weighed voting is promising but in the case of Trojan circuits where there is no change in the output of the circuit; enhanced weighed voting algorithm fails to detect the Trojans effectively. Therefore, a two-phased voting algorithm is performed to increase the detection efficiency. ISCAS '85 Benchmark circuits were used to test the efficiency of the proposed technique.
引用
收藏
页码:608 / 617
页数:10
相关论文
共 9 条
[1]   System-level protection and hardware Trojan detection using weighted voting [J].
Amin, Hany A. M. ;
Alkabani, Yousra ;
Selim, Gamal M. I. .
JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) :499-505
[2]   Malicious Circuit Detection for Improved Hardware Security [J].
Bharath, R. ;
Sabari, G. Arun ;
Krishna, Dhinesh Ravi ;
Prasathe, Arun ;
Harish, K. ;
Mohankumar, N. ;
Devi, M. Nirmala .
SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 :464-472
[3]  
Byeongju Cha, 2012, 2012 21st Asian Test Symposium (ATS 2012). Proceedings, P355, DOI 10.1109/ATS.2012.64
[4]  
Du DD, 2010, LECT NOTES COMPUT SC, V6225, P173, DOI 10.1007/978-3-642-15031-9_12
[5]  
Karunakaran D. K., 2014, 5 INT C COMP COMM NE, P1, DOI DOI 10.1109/ICCCNT.2014.6963036
[6]  
Latif-Shabgahi G., 2001, P PDP2001 9 EUR WORK
[7]  
Mohankumar N., 2016, INDIAN J SCI TECHNOL, V9, DOI DOI 10.17485/ijst/2016/v9iS1/107899
[8]   A Survey of Hardware Trojan Taxonomy and Detection [J].
Tehranipoor, Mohammad ;
Koushanfar, Farinaz .
IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01) :10-25
[9]   Scalable Hardware Trojan Diagnosis [J].
Wei, Sheng ;
Potkonjak, Miodrag .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (06) :1049-1057