scholarly journals A dual mode self-test for a stand alone AES core

PLoS ONE ◽  
2021 ◽  
Vol 16 (12) ◽  
pp. e0261431
Author(s):  
Fakir Sharif Hossain ◽  
Taiyeb Hasan Sakib ◽  
Muhammad Ashar ◽  
Rian Ferdian

Advanced Encryption Standard (AES) is the most secured ciphertext algorithm that is unbreakable in a software platform’s reasonable time. AES has been proved to be the most robust symmetric encryption algorithm declared by the USA Government. Its hardware implementation offers much higher speed and physical security than that of its software implementation. The testability and hardware Trojans are two significant concerns that make the AES chip complex and vulnerable. The problem of testability in the complex AES chip is not addressed yet, and also, the hardware Trojan insertion into the chip may be a significant security threat by leaking information to the intruder. The proposed method is a dual-mode self-test architecture that can detect the hardware Trojans at the manufacturing test and perform an online parametric test to identify parametric chip defects. This work contributes to partitioning the AES circuit into small blocks and comparing adjacent blocks to ensure self-referencing. The detection accuracy is sharpened by a comparative power ratio threshold, determined by process variations and the accuracy of the built-in current sensors. This architecture can reduce the delay, power consumption, and area overhead compared to other works.

Electronics ◽  
2018 ◽  
Vol 7 (7) ◽  
pp. 124 ◽  
Author(s):  
Catherine Rooney ◽  
Amar Seeam ◽  
Xavier Bellekens

As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans. A hardware trojan is a malicious inclusion or alteration to the existing design of an integrated circuit, with the possible effects ranging from leakage of sensitive information to the complete destruction of the integrated circuit itself. While the majority of existing detection schemes focus on test-time, they all require expensive methodologies to detect hardware trojans. Off-the-shelf approaches have often been overlooked due to limited hardware resources and detection accuracy. With the advances in technologies and the democratisation of open-source hardware, however, these tools enable the detection of hardware trojans at reduced costs during or after production. In this manuscript, a hardware trojan is created and emulated on a consumer FPGA board. The experiments to detect the trojan in a dormant and active state are made using off-the-shelf technologies taking advantage of different techniques such as Power Analysis Reports, Side Channel Analysis and Thermal Measurements. Furthermore, multiple attempts to detect the trojan are demonstrated and benchmarked. Our simulations result in a state-of-the-art methodology to accurately detect the trojan in both dormant and active states using off-the-shelf hardware.


2021 ◽  
pp. 37-47
Author(s):  
Ajay Agarwal

The pandemic of COVID19 illuminated the presence of our society’s cognition in a low-ceiling, inhabitable room, with almost little to none illumination of truth. Such a low-ceiling doesn’t only restrict the freedom of our cognition but also inhibits its healthy growth. Subsequently, our society feels a pushing sense, which is often exaggerated by the dark periods of misinformation, disinformation, and fake news. Hence, it becomes essential to rethink the interior designs of our cognition – How can we look at these periods of misinformation from a different lens? Can we use them to our advantage to make our room looks spacious enough for the growth of our cognition? Despite the limitations imposed to the ceiling length by our existing cognitive biases, there exist multiple, unconventional interdisciplinary approaches from the fields of epistemology, phenomenology, evolutionary psychology, and finally, the mathematics that we, as researchers, can leverage to broaden our understanding about the existing “misinfodemic” that presents as a ripple effect of COVID19 on our society’s cognition. The aim of this paper shall be the same – to present a noble discourse regarding the “dark period of misinformation” – why misinformation is NOT a pandemic but a widely-used misnomer, how the source of truthful information acts a source of misinformation, why misinformation is needed for the development of a better cognitive heuristic framework for our society, and finally, why such unconventional approaches fail to see the light of research. While the existing approaches to deal with misinformation spiral around machine-learning models competing with each other for better detection accuracy, this paper will take the reader right to the epicenter of “misinfodemic” using a variety of routes. Towards the end, the author provides how the mentioned approaches not only widen our understanding regarding the universal phenomenon of misinformation but also can be leveraged and scaled for irrational human behaviors like suicide, partisanship, and even student gun violence in the USA.


2017 ◽  
Vol 5 (4) ◽  
pp. 102-116 ◽  
Author(s):  
Chris Boselli ◽  
Jason Danis ◽  
Sandra McQueen ◽  
Alex Breger ◽  
Tao Jiang ◽  
...  

Purpose Small unmanned aircraft systems (sUAS) are becoming increasingly popular among hobbyists, and with this popularity there comes the risk of runway incursion between a commercial aircraft and sUAS around airports. To keep airports safe and secure, the purpose of this paper is to propose a module, called the Airport Secure Perimeter Control System, that can be attached to every hobbyist’s sUAS for the purpose of notification and prevention. Design/methodology/approach Upon startup, the module connects to a database containing the central coordinates of every airport in the USA. A five-mile critical radius plus an additional one-mile buffer region is established around each point. The buffer region is created in order to inform the user that he/she is approaching a safe airspace and needs to take corrective action. Once the five-mile zone has been breached, autopilot software takes over the manual controls, and the sUAS is landed in a controlled manner, while the user still has lateral control of the vehicle in order to avoid any potential hazards below it. Then, both operator and airport receive messages about the event. Findings To demonstrate the proposed design, a prototype was developed that successfully implemented this system, and was formally tested within a controlled environment. Originality/value This solution would drastically reduce the security threat of sUAS breaching the critical regions surrounding airports, and its implementation is relatively simple.


2014 ◽  
Vol 933 ◽  
pp. 482-486
Author(s):  
Masaya Yoshikawa ◽  
Yusuke Mori ◽  
Takeshi Kumaki

Recently, the threat of hardware Trojans has garnered attention. Hardware Trojans are malicious circuits that are incorporated into large-scale integrations (LSIs) during the manufacturing process. When predetermined conditions specified by an attacker are satisfied, the hardware Trojan is triggered and performs subversive activities without the LSI users even being aware of these activities. In previous studies, a hardware Trojan was incorporated into a cryptographic circuit to estimate confidential information. However, Trojan triggers have seldom been studied. The present study develops several new Trojan triggers and each of them is embedded in a field-programmable gate array (FPGA). Subsequently, the ease of detection of each trigger is verified from the standpoint of area.


2021 ◽  
pp. 097359842110420
Author(s):  
Shreejita Biswas

The recent outbreak of the COVID-19 pandemic demands imperative discussions in the field of health security and global governance. Traditional studies on health care and global governance have acknowledged the significance of “global” as it rested on the fact that epidemics and pandemics are not restricted within national boundaries. The COVID-19 pandemic has challenged the hierarchical division of norm diffusion. Despite the structural inequalities, the patterns of behavior of various countries, such as China, the USA, Italy, South Korea, and India, in managing the crisis suggest a favorable ground for bringing in the importance of national-level decision-making in the global versus local debate. Building upon the arguments from norm theories of diffusion, the article contributes to our understanding that for an effective analysis of the politics of global health governance, the power of local channels in the diffusion of essential health norms cannot be undermined. The article studies the role played by the local-level diffusion processes, in this case, the national state actors in reshaping and integrating essential health norms to make it workable for broader global relevance. As a result, following the norm theories of diffusion, this article analyzes the global–local dynamics with regard to public health in the context of the spread of the COVID-19 health security threat.


2020 ◽  
Author(s):  
Tapadhir Das

In recent years, integrated circuits (ICs) have become<br>significant for various industries and their security has<br>been given greater priority, specifically in the supply chain.<br>Budgetary constraints have compelled IC designers to offshore manufacturing to third-party companies. When the designer gets the manufactured ICs back, it is imperative to test for potential threats like hardware trojans (HT). In this paper, a novel multilevel game-theoretic framework is introduced to analyze the interactions between a malicious IC manufacturer and the tester. In particular, the game is formulated as a non-cooperative, zerosum, repeated game using prospect theory (PT) that captures different players’ rationalities under uncertainty. The repeated game is separated into a learning stage, in which the defender<br><div>learns about the attacker’s tendencies, and an actual game stage, where this learning is used. Experiments show great incentive for the attacker to deceive the defender about their actual rationality by “playing dumb” in the learning stage (deception). This scenario is captured using hypergame theory to model the attacker’s view of the game. The optimal deception rationality of the attacker is analytically derived to maximize utility gain. For the defender, a first-step deception mitigation process is proposed to thwart the effects of deception. Simulation results show that the attacker can profit from the deception as it can successfully insert HTs in the manufactured ICs without being detected.</div><div><br></div><div>This paper has been accepted for publication in <b>IEEE Cyber Science Conference 2020</b><br></div>


Sign in / Sign up

Export Citation Format

Share Document