Cargando…
Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in general integrated c...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10144499/ https://www.ncbi.nlm.nih.gov/pubmed/37421062 http://dx.doi.org/10.3390/mi14040828 |
_version_ | 1785034114699624448 |
---|---|
author | Hussain, Musharraf Baloach, Naveed Khan Ali, Gauhar ElAffendi, Mohammed Dhaou, Imed Ben Ullah, Syed Sajid Uddin, Mueen |
author_facet | Hussain, Musharraf Baloach, Naveed Khan Ali, Gauhar ElAffendi, Mohammed Dhaou, Imed Ben Ullah, Syed Sajid Uddin, Mueen |
author_sort | Hussain, Musharraf |
collection | PubMed |
description | Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in general integrated circuits. However, insufficient effort has been made for hardware Trojans (HTs) in the network-on-chip. In this study, we implement a countermeasure to congeal the network-on-chip hardware design in order to prevent changes from being made to the network-on-chip design. We propose a collaborative method which uses flit integrity and dynamic flit permutation to eliminate the hardware Trojan inserted into the router of the NoC by a disloyal employee or a third-party vendor corporation. The proposed method increases the number of received packets by up to 10% more compared to existing techniques, which contain HTs in the destination address of the flit. Compared to the runtime HT mitigation method, the proposed scheme also decreases the average latency for the hardware Trojan inserted in the flit’s header, tail, and destination field up to 14.7%, 8%, and 3%, respectively. |
format | Online Article Text |
id | pubmed-10144499 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-101444992023-04-29 Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) Hussain, Musharraf Baloach, Naveed Khan Ali, Gauhar ElAffendi, Mohammed Dhaou, Imed Ben Ullah, Syed Sajid Uddin, Mueen Micromachines (Basel) Article Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in general integrated circuits. However, insufficient effort has been made for hardware Trojans (HTs) in the network-on-chip. In this study, we implement a countermeasure to congeal the network-on-chip hardware design in order to prevent changes from being made to the network-on-chip design. We propose a collaborative method which uses flit integrity and dynamic flit permutation to eliminate the hardware Trojan inserted into the router of the NoC by a disloyal employee or a third-party vendor corporation. The proposed method increases the number of received packets by up to 10% more compared to existing techniques, which contain HTs in the destination address of the flit. Compared to the runtime HT mitigation method, the proposed scheme also decreases the average latency for the hardware Trojan inserted in the flit’s header, tail, and destination field up to 14.7%, 8%, and 3%, respectively. MDPI 2023-04-08 /pmc/articles/PMC10144499/ /pubmed/37421062 http://dx.doi.org/10.3390/mi14040828 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Hussain, Musharraf Baloach, Naveed Khan Ali, Gauhar ElAffendi, Mohammed Dhaou, Imed Ben Ullah, Syed Sajid Uddin, Mueen Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) |
title | Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) |
title_full | Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) |
title_fullStr | Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) |
title_full_unstemmed | Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) |
title_short | Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) |
title_sort | hardware trojan mitigation technique in network-on-chip (noc) |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10144499/ https://www.ncbi.nlm.nih.gov/pubmed/37421062 http://dx.doi.org/10.3390/mi14040828 |
work_keys_str_mv | AT hussainmusharraf hardwaretrojanmitigationtechniqueinnetworkonchipnoc AT baloachnaveedkhan hardwaretrojanmitigationtechniqueinnetworkonchipnoc AT aligauhar hardwaretrojanmitigationtechniqueinnetworkonchipnoc AT elaffendimohammed hardwaretrojanmitigationtechniqueinnetworkonchipnoc AT dhaouimedben hardwaretrojanmitigationtechniqueinnetworkonchipnoc AT ullahsyedsajid hardwaretrojanmitigationtechniqueinnetworkonchipnoc AT uddinmueen hardwaretrojanmitigationtechniqueinnetworkonchipnoc |