2016 17th International Symposium on Quality Electronic Design (ISQED) 2016
DOI: 10.1109/isqed.2016.7479228
|View full text |Cite
|
Sign up to set email alerts
|

SVM-based real-time hardware Trojan detection for many-core platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 57 publications
(30 citation statements)
references
References 17 publications
0
30
0
Order By: Relevance
“…3) BUS SECURITY Bus security precautions intend to provide effective countermeasures against malicious on-chip traffic behaviors to ensure the security of communication and the reliability of data transmission between multiple cores in a multiprocessor SoC environment [105], [106]. The major malicious behaviors along this line include denial of service (DoS) [107], linker behavior [26], [27], and router behavior [108], which are launched by HTs implanted in links or routers. Attackers may exploit covert communication [73], [109], bus idle states [110], and peripheral interfaces [28] to disclose confidential information, tamper with communication data, interfere with normal operations, and perform DoS attacks.…”
Section: -Implantation Preventionmentioning
confidence: 99%
“…3) BUS SECURITY Bus security precautions intend to provide effective countermeasures against malicious on-chip traffic behaviors to ensure the security of communication and the reliability of data transmission between multiple cores in a multiprocessor SoC environment [105], [106]. The major malicious behaviors along this line include denial of service (DoS) [107], linker behavior [26], [27], and router behavior [108], which are launched by HTs implanted in links or routers. Attackers may exploit covert communication [73], [109], bus idle states [110], and peripheral interfaces [28] to disclose confidential information, tamper with communication data, interfere with normal operations, and perform DoS attacks.…”
Section: -Implantation Preventionmentioning
confidence: 99%
“…DoS attacks on a many-core chip can target different components of the chip, including the memory system [15], and the network-on-chip (NoC) [16], [17]. With the help of hardware Trojans (HTs) [3], [4], [13], DoS attacks can be classified as 1) flooding attack [18], [19], where a large volume of useless packets floods a victim node and saturates it; 2) packet drop attack, where some packets are dropped or directed to some malicious nodes so that the victim node can never receive a single packet designated to it [20]; 3) privilege escalation attack [21], where an average user process is granted the privileges of a supervisor so that it can steal passwords; and 4) routing loop attack [2], where packets that pass the malicious node will be routed back to the source node, effectively blocking the source core from communicating with any other cores.…”
Section: B Dos Attackmentioning
confidence: 99%
“…Unfortunately, many-core chips are susceptible to be attacked by hardware Trojans (HT) which can be easily implanted to the chips at any stage from design to manufacturing, as chip designing and manufacturing is going global, and licensing of third party IP cores is becoming a commonplace in manycore chip designs. In contrast to a modern many-core chip with billions of transistors and complex functionalities, an HT circuit has an extremely low transistor count, making it hardly visible, and thus difficult to be detected by most known offline HT detection methods [1], [2]. If many-core devices infected with HTs finally get deployed, they can create catastrophic effects, including dangerous security breach and severe performance degradation [3], [4].…”
Section: Introductionmentioning
confidence: 99%
“…In a good ML data-set, each feature must contribute to the class i.e better correlation between feature and the class, but not among the features [4] [5]. Relevant feature selection will aid both, increasing accuracy of Trojan detection and hardware implementation.…”
Section: A Feature Extraction and Optimizationmentioning
confidence: 99%
“…In-depth analysis of SVM and K-NN as Trojan Detection technique is performed in [4] [5]. To demonstrate detection accuracy for unexpected attack, the model is trained with two types of attacks, namely core spoofing and route looping attack.…”
Section: Analysis Of Machine Learning Algorithmsmentioning
confidence: 99%