2022
DOI: 10.1587/elex.19.20220167
|View full text |Cite
|
Sign up to set email alerts
|

A multi-level architecture for hardware Trojan and vulnerability runtime detection and response towards cryptographic IP

Abstract: Existing functional validation approaches and postmanufacturing tests are inadequate to detect all hardware bugs and hardware Trojans in third-party intellectual property blocks (3PIPs). Especially for cryptographic IPs, a well-designed framework is needed for detecting and mitigating hardware security risks even after chip deployment. In this paper, we present an innovative multi-level architecture providing runtime hardware security detection and response. The proposed architecture consists of a controller a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 28 publications
(32 reference statements)
0
1
0
Order By: Relevance
“…Runtime protection techniques are the last line of defense against HT attacks, which can be categorized into runtime monitoring and runtime tolerance techniques. Dong et al [15] designed a multilevel architecture to protect third-party encrypted IP by secure wrapper and controller. The wrapper checks the input and output signals of the IP, and the controller configures different levels of response measures based on the results of the wrapper to mitigate the security issues of the encrypted IP.…”
Section: Introductionmentioning
confidence: 99%
“…Runtime protection techniques are the last line of defense against HT attacks, which can be categorized into runtime monitoring and runtime tolerance techniques. Dong et al [15] designed a multilevel architecture to protect third-party encrypted IP by secure wrapper and controller. The wrapper checks the input and output signals of the IP, and the controller configures different levels of response measures based on the results of the wrapper to mitigate the security issues of the encrypted IP.…”
Section: Introductionmentioning
confidence: 99%