Details

Cryptographic Design Against HTH Virus Using Counterfeit Logic

Ahamada Shreen J

M.E VLSI DESIGN, SCAD College of Engineering & Technology, Cheranmahadevi, Tamilnadu,

Prem Ananth R

Assistant Professor, SCAD College of Engineering & Technology, Cheranmahadevi, Tamilnadu

198-204

Vol: 6, Issue: 3, 2016

Receiving Date: 2016-06-21 Acceptance Date:

2016-07-30

Publication Date:

2016-09-03

Download PDF

Abstract

While research in security and its implementation in hardware has been on-going for many decades, the concept of hardware security was not formally introduced until the emergence of hardware Trojans and their detection methods. For most of existing Trojan detection methods, scalability becomes a concern. Therefore, researchers started to look into post-deployment methods leveraging post-deployment side-channel fingerprinting and on-chip equivalence checking. The key idea here was that stealthy hardware Trojans may easily evade detection methods during testing stage but, if triggered, they will cause large impact to side-channel fingerprinting or to circuit functionality. To increase HT detection sensitivity, this paper introduces the low-level HTH protection scheme by filling the unused resources of the FPGA with low-level counterfeit logic (LLCL).The proposed scheme identifies unused resources within the FPGA device and propose counterfeit logic cells for different resources of FPGAs. The proposed scheme significantly reduces the chance of application space HTH attacks by giving no free configurable resource for HTHs insertion in the design’s bit stream. The malicious inclusion can either disturb the functionality of the original design, incur device fluctuations such as warming up or transistor aging.The proposed system can detect HTs, even if the HT size is small. Simulation results show that the proposed method achieves up to 100% HT detection rate

Keywords: limestone; cement production; SWIR; band ratio; Landsat 8; network analysis

References

  1. Agrawal et al.D, (2007), „„Trojan Detection Using IC Fingerprinting,‟‟Proc. IEEE Symp. Security and Privacy (SP 07), IEEE CS Press, pp. 296-310
  2. Ahmed Aliyu, Abdulaziz Bello, Usman Joda Mohammed Ibrahim Hussaini Alhassan,(2014),” Hardware Trojan Model For Attack And Detection Techniques”, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 3, ISSUE 3, ISSN 2277-8616,Pages: 102-105
  3. Asadi.H and Tahoori.M.B,(2007), “Analytical techniques for soft error rate modeling and mitigation of FPGA-based designs,” IEEE Trans. Very Large Scale Integr., vol. 15, no. 12, pp. 1320–1331.
  4. Behnam Khaleghi, Ali Ahari, Hossein Asadi, and Siavash Bayat-Sarmadi,(2015),” FPGA-Based Protection Scheme against Hardware Trojan Horse Insertion Using Dummy Logic”, IEEE EMBEDDED SYSTEMS LETTERS, VOL. 7, NO. 2, Pg 46-50.
  5. Canright.D and Osvik.D.A,(2009), “A More Compact AES,” Selected Areas in Cryptography, pp. 157-169, Springer-Verlag
  6. Chakraborty.R.S, Narasimhan.S, and Bhunia.S,(2009) “Hardware trojan: Threats and emerging solutions,” in Proc. IEEE Int. High Level Design Validation Test Workshop (HLDVT), pp. 166–171, IEEE.
  7. Chakraborty.R.S, Paul.S, and Bhunia.S,(2008), 'On-Demand Transparency for Improving Hardware Trojan Detectability,' Proc. IEEE Int‟l Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE CS Press, pp. 48-50.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.

alexistogel toto online

bandar alexistogel

alexistogel bandar gacor

alexistogel link

alexistogel online

alexistogel bandar togel

link alternatif alexistogel

alexistogel

alexistogel

alexistogel

alexistogel daftar

alexistogel toto macau

alexistogel bandar macau

alexistogel slot

alexistogel agen slot

situs alexistogel

alexistogel

alexistogel

alexistogel

alexistogel

alexistogel bandar slot

alexistogel

Alexistogel Toto Macau

bandar alexistogel

slot alexistogel

alexistogel bandar togel

alexistogel

alexistogel slot

alexistogel

daftar alexistogel

alexistogel online

rtp alexistogel

alexistogel slot

alexistogel gacor

link alternatif alexistogel

alexistogel login

alexistogel

alexistogel slot dana

agen togel online

bandar togel online

alexistogel rtp

alexistogel slot

alexistogel daftar

slot online dana

situs slot online

alexistogel

bandar togel online

slot online terpercaya

togel slot online

agen slot online gacor

rtp live slot online

bandar slot online

bandar slot online gacor

agen slot online

daftar bandar togel slot

bandar togel online

togel slot hari ini

link alternatif togel slot

rtp slot online gacor

slot online gacor

alexistogel terpercaya

rtp slot gacor

slot online gacor

tips slot maxwin

togel slot gacor

prediksi togel

game slot gacor

trik slot online

prediksi togel jitu

game slot online

togel online terpercaya

daftar togel slot online

bandar togel terpercaya

slot online gacor

trik slot bonus

prediksi togel online

rtp slot online

panduan togel online

prediksi togel

RTP LIVE

Bandar Toto Macau

Situs Slot Gacor

bandarbola855 resmi

bandarbola855 gacor

bandarbola855 slot

link bandarbola855

bandarbola855 rtp

bandarbola855 link

bandarbola855 bandar

bandarbola855

bandarbola855 slot

bandarbola855 terpercaya

bandarbola855 slot

bandarbola855 daftar

bandarbola855 link

bandarbola855

bandarbola855

bandarbola855

iosbet

iosbet

link iosbet

slot online iosbet

iosbet link login

slot iosbet

iosbet gacor

iosbet

slot iosbet

agen iosbet

bandar iosbet

iosbet

iosbet link

iosbet

iosbet

iosbet

iosbet

liatogel

login liatogel

liatogel totomacau