Cargando…

Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)

Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in general integrated c...

Descripción completa

Detalles Bibliográficos
Autores principales: Hussain, Musharraf, Baloach, Naveed Khan, Ali, Gauhar, ElAffendi, Mohammed, Dhaou, Imed Ben, Ullah, Syed Sajid, Uddin, Mueen
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10144499/
https://www.ncbi.nlm.nih.gov/pubmed/37421062
http://dx.doi.org/10.3390/mi14040828
_version_ 1785034114699624448
author Hussain, Musharraf
Baloach, Naveed Khan
Ali, Gauhar
ElAffendi, Mohammed
Dhaou, Imed Ben
Ullah, Syed Sajid
Uddin, Mueen
author_facet Hussain, Musharraf
Baloach, Naveed Khan
Ali, Gauhar
ElAffendi, Mohammed
Dhaou, Imed Ben
Ullah, Syed Sajid
Uddin, Mueen
author_sort Hussain, Musharraf
collection PubMed
description Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in general integrated circuits. However, insufficient effort has been made for hardware Trojans (HTs) in the network-on-chip. In this study, we implement a countermeasure to congeal the network-on-chip hardware design in order to prevent changes from being made to the network-on-chip design. We propose a collaborative method which uses flit integrity and dynamic flit permutation to eliminate the hardware Trojan inserted into the router of the NoC by a disloyal employee or a third-party vendor corporation. The proposed method increases the number of received packets by up to 10% more compared to existing techniques, which contain HTs in the destination address of the flit. Compared to the runtime HT mitigation method, the proposed scheme also decreases the average latency for the hardware Trojan inserted in the flit’s header, tail, and destination field up to 14.7%, 8%, and 3%, respectively.
format Online
Article
Text
id pubmed-10144499
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-101444992023-04-29 Hardware Trojan Mitigation Technique in Network-on-Chip (NoC) Hussain, Musharraf Baloach, Naveed Khan Ali, Gauhar ElAffendi, Mohammed Dhaou, Imed Ben Ullah, Syed Sajid Uddin, Mueen Micromachines (Basel) Article Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in general integrated circuits. However, insufficient effort has been made for hardware Trojans (HTs) in the network-on-chip. In this study, we implement a countermeasure to congeal the network-on-chip hardware design in order to prevent changes from being made to the network-on-chip design. We propose a collaborative method which uses flit integrity and dynamic flit permutation to eliminate the hardware Trojan inserted into the router of the NoC by a disloyal employee or a third-party vendor corporation. The proposed method increases the number of received packets by up to 10% more compared to existing techniques, which contain HTs in the destination address of the flit. Compared to the runtime HT mitigation method, the proposed scheme also decreases the average latency for the hardware Trojan inserted in the flit’s header, tail, and destination field up to 14.7%, 8%, and 3%, respectively. MDPI 2023-04-08 /pmc/articles/PMC10144499/ /pubmed/37421062 http://dx.doi.org/10.3390/mi14040828 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Hussain, Musharraf
Baloach, Naveed Khan
Ali, Gauhar
ElAffendi, Mohammed
Dhaou, Imed Ben
Ullah, Syed Sajid
Uddin, Mueen
Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
title Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
title_full Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
title_fullStr Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
title_full_unstemmed Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
title_short Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
title_sort hardware trojan mitigation technique in network-on-chip (noc)
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10144499/
https://www.ncbi.nlm.nih.gov/pubmed/37421062
http://dx.doi.org/10.3390/mi14040828
work_keys_str_mv AT hussainmusharraf hardwaretrojanmitigationtechniqueinnetworkonchipnoc
AT baloachnaveedkhan hardwaretrojanmitigationtechniqueinnetworkonchipnoc
AT aligauhar hardwaretrojanmitigationtechniqueinnetworkonchipnoc
AT elaffendimohammed hardwaretrojanmitigationtechniqueinnetworkonchipnoc
AT dhaouimedben hardwaretrojanmitigationtechniqueinnetworkonchipnoc
AT ullahsyedsajid hardwaretrojanmitigationtechniqueinnetworkonchipnoc
AT uddinmueen hardwaretrojanmitigationtechniqueinnetworkonchipnoc