hardware trojan
Recently Published Documents


TOTAL DOCUMENTS

645
(FIVE YEARS 257)

H-INDEX

34
(FIVE YEARS 5)

Electronics ◽  
2022 ◽  
Vol 11 (2) ◽  
pp. 245
Author(s):  
Konstantinos G. Liakos ◽  
Georgios K. Georgakilas ◽  
Fotis C. Plessas ◽  
Paris Kitsos

A significant problem in the field of hardware security consists of hardware trojan (HT) viruses. The insertion of HTs into a circuit can be applied for each phase of the circuit chain of production. HTs degrade the infected circuit, destroy it or leak encrypted data. Nowadays, efforts are being made to address HTs through machine learning (ML) techniques, mainly for the gate-level netlist (GLN) phase, but there are some restrictions. Specifically, the number and variety of normal and infected circuits that exist through the free public libraries, such as Trust-HUB, are based on the few samples of benchmarks that have been created from circuits large in size. Thus, it is difficult, based on these data, to develop robust ML-based models against HTs. In this paper, we propose a new deep learning (DL) tool named Generative Artificial Intelligence Netlists SynthesIS (GAINESIS). GAINESIS is based on the Wasserstein Conditional Generative Adversarial Network (WCGAN) algorithm and area–power analysis features from the GLN phase and synthesizes new normal and infected circuit samples for this phase. Based on our GAINESIS tool, we synthesized new data sets, different in size, and developed and compared seven ML classifiers. The results demonstrate that our new generated data sets significantly enhance the performance of ML classifiers compared with the initial data set of Trust-HUB.


PLoS ONE ◽  
2021 ◽  
Vol 16 (12) ◽  
pp. e0261431
Author(s):  
Fakir Sharif Hossain ◽  
Taiyeb Hasan Sakib ◽  
Muhammad Ashar ◽  
Rian Ferdian

Advanced Encryption Standard (AES) is the most secured ciphertext algorithm that is unbreakable in a software platform’s reasonable time. AES has been proved to be the most robust symmetric encryption algorithm declared by the USA Government. Its hardware implementation offers much higher speed and physical security than that of its software implementation. The testability and hardware Trojans are two significant concerns that make the AES chip complex and vulnerable. The problem of testability in the complex AES chip is not addressed yet, and also, the hardware Trojan insertion into the chip may be a significant security threat by leaking information to the intruder. The proposed method is a dual-mode self-test architecture that can detect the hardware Trojans at the manufacturing test and perform an online parametric test to identify parametric chip defects. This work contributes to partitioning the AES circuit into small blocks and comparing adjacent blocks to ensure self-referencing. The detection accuracy is sharpened by a comparative power ratio threshold, determined by process variations and the accuracy of the built-in current sensors. This architecture can reduce the delay, power consumption, and area overhead compared to other works.


2021 ◽  
Vol 141 (12) ◽  
pp. 1234-1240
Author(s):  
Yusuke Nozaki ◽  
Shu Takemoto ◽  
Yoshiya Ikezaki ◽  
Masaya Yoshikawa
Keyword(s):  

2021 ◽  
pp. 177-191
Author(s):  
Matli Nishanth Reddy ◽  
M. R. Latchmana Kumar ◽  
Pusarla Bhaskara Sai Kumar ◽  
S. Thirumalai ◽  
M. Nirmala Devi

2021 ◽  
Author(s):  
Mohammad Humam Khan ◽  
Ruchika Gupta ◽  
John Jose ◽  
Sukumar Nandi

Sign in / Sign up

Export Citation Format

Share Document