Skip to main content

2018 | OriginalPaper | Buchkapitel

HAPMAD: Hardware-Based Authentication Platform for Malicious Activity Detection in Digital Circuits

verfasst von : Venkata Raja Ramchandar Koneru, Bikki Krishna Teja, Kallam Dinesh Babu Reddy, Makam V. GnanaSwaroop, Bharath Ramanidharan, N. Mohankumar

Erschienen in: Information Systems Design and Intelligent Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Hardware Trojans pose a major threat to the security of many industries and government agencies. This paper proposes a non-destructive method for detection of Hardware Trojans named HAPMAD—Hardware-Based Authentication Platform for Malicious Activity Detection in Digital Circuits using a combination of enhanced voting algorithm and hybrid voting algorithm (power and time analysis). Detecting a hardware Trojan is a cumbersome task. In most cases, the hardware Trojan can be detected only by activating it or by magnifying the Trojan activity. The detection efficiency using enhanced weighed voting is promising but in the case of Trojan circuits where there is no change in the output of the circuit; enhanced weighed voting algorithm fails to detect the Trojans effectively. Therefore, a two-phased voting algorithm is performed to increase the detection efficiency. ISCAS ‘85 Benchmark circuits were used to test the efficiency of the proposed technique.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Tehranipoor M, Koushanfar F. A survey of hardware Trojan taxonomy and detection. In: IEEE Design and Test, vol. 27; pp. 10– 25, (2010). Tehranipoor M, Koushanfar F. A survey of hardware Trojan taxonomy and detection. In: IEEE Design and Test, vol. 27; pp. 10– 25, (2010).
2.
Zurück zum Zitat Du D, Narasimhan S, Chakraborty R, Bhunia S. Selfreferencing: a scalable side-channel approach for hardware Trojan detection. In: Proceedings of the 12th International Conference on Cryptographic Hardware and Embedded Systems, CHES’10; p. 173– 87, (2010). Du D, Narasimhan S, Chakraborty R, Bhunia S. Selfreferencing: a scalable side-channel approach for hardware Trojan detection. In: Proceedings of the 12th International Conference on Cryptographic Hardware and Embedded Systems, CHES’10; p. 173– 87, (2010).
3.
Zurück zum Zitat Dhineshkumar.K, Mohankumar.N, Malicious combinational hardware Trojan detection by gate level characterization in 90 nm technology. In: Proceedings of International Conference on Computing, Communication and Networking Technologies, China, pp. 1–7 (2014). Dhineshkumar.K, Mohankumar.N, Malicious combinational hardware Trojan detection by gate level characterization in 90 nm technology. In: Proceedings of International Conference on Computing, Communication and Networking Technologies, China, pp. 1–7 (2014).
4.
Zurück zum Zitat N. Mohankumar, M. Nirmala Devi. Improving the Classification Accuracy in Detecting Hardware Trojan in ALU Using PCA. In: Indian Journal of Science and Technology, vol. 9, Special Issue 1, (2016). N. Mohankumar, M. Nirmala Devi. Improving the Classification Accuracy in Detecting Hardware Trojan in ALU Using PCA. In: Indian Journal of Science and Technology, vol. 9, Special Issue 1, (2016).
5.
Zurück zum Zitat B. Cha and S. Gupta, “Efficient trojan detection via calibration of process variations,” in Test Symposium (ATS), 2012 IEEE 21st Asian, Nov 2012, pp. 355–361. B. Cha and S. Gupta, “Efficient trojan detection via calibration of process variations,” in Test Symposium (ATS), 2012 IEEE 21st Asian, Nov 2012, pp. 355–361.
6.
Zurück zum Zitat S. Wei and M. Potkonjak, “Scalable hardware trojan diagnosis,” Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, vol. 20, no. 6, pp. 1049–1057, (2012). S. Wei and M. Potkonjak, “Scalable hardware trojan diagnosis,” Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, vol. 20, no. 6, pp. 1049–1057, (2012).
7.
Zurück zum Zitat G. Latif-Shabgahi, J.M. Bass, S. Bennett, History-Based Weighed Average Voter: A Novel Software Voting Algorithm for Fault-Tolerant Computer Systems, Proc. PDP2001: 9th Euromicro Workshop on Parallel and Distributed Processing, February 7–9, Mantova, Italy, (2001). G. Latif-Shabgahi, J.M. Bass, S. Bennett, History-Based Weighed Average Voter: A Novel Software Voting Algorithm for Fault-Tolerant Computer Systems, Proc. PDP2001: 9th Euromicro Workshop on Parallel and Distributed Processing, February 7–9, Mantova, Italy, (2001).
8.
Zurück zum Zitat Hany A.M. Amin, YousraAlkabani, Gamal M.I. Selim. System-level protection and hardware Trojan detection using weighed voting. In:Journal of Advanced Research 5, p. 499–505, (2014). Hany A.M. Amin, YousraAlkabani, Gamal M.I. Selim. System-level protection and hardware Trojan detection using weighed voting. In:Journal of Advanced Research 5, p. 499–505, (2014).
9.
Zurück zum Zitat R. Bharath, G. Arun Sabari, Dhinesh Ravi Krishna, Arun Prasathe, K. Harish, N. Mohankumar, and M. Nirmala Devi,” Malicious Circuit Detection for Improved Hardware Security,” Springer International Publishing Switzerland, CCIS 536, pp. 464–472, (2015). R. Bharath, G. Arun Sabari, Dhinesh Ravi Krishna, Arun Prasathe, K. Harish, N. Mohankumar, and M. Nirmala Devi,” Malicious Circuit Detection for Improved Hardware Security,” Springer International Publishing Switzerland, CCIS 536, pp. 464–472, (2015).
Metadaten
Titel
HAPMAD: Hardware-Based Authentication Platform for Malicious Activity Detection in Digital Circuits
verfasst von
Venkata Raja Ramchandar Koneru
Bikki Krishna Teja
Kallam Dinesh Babu Reddy
Makam V. GnanaSwaroop
Bharath Ramanidharan
N. Mohankumar
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7512-4_60