2022
DOI: 10.3390/app12136601
|View full text |Cite
|
Sign up to set email alerts
|

Towards Trust Hardware Deployment of Edge Computing: Mitigation of Hardware Trojans Based on Evolvable Hardware

Abstract: Hardware Trojans (HTs) are malicious hardware components designed to leak confidential information or cause the chip/circuit on which they are integrated to malfunction during operation. When we deploy such hardware platforms for edge computing, FPGA-based implementations of Coarse-Grained Reconfigurable Array (CGRA) are also currently falling victim to HT insertion. However, for CGRA, an evolvable hardware (EHW) platform, which has the ability to dynamically change its configuration and behavioral characteris… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 24 publications
(24 reference statements)
0
2
0
Order By: Relevance
“…Extract the specific information nsfr, frofs, 1stCW, 2ndCW from the PIP database firstly. Then the actual start frame address of the specific PIP, frame, is calculated according to (14).…”
Section: Chromosome Decoding and Cb Online Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…Extract the specific information nsfr, frofs, 1stCW, 2ndCW from the PIP database firstly. Then the actual start frame address of the specific PIP, frame, is calculated according to (14).…”
Section: Chromosome Decoding and Cb Online Generationmentioning
confidence: 99%
“…Currently, EHW has two mainstream implementation techniques [8,9]: virtual reconfigurable circuit (VRC)-based evolution [10,11,12,13,14] and dynamic partial reconfiguration (DPR)-based evolution [15,16,17,18,19]. The VRC is a virtual reconfigurable hardware layer built on top of the FPGA fabric that composed of an array of processing elements (PEs), where each PE contains all the intended required functions along with certain inter-PE connectivity configuration.…”
Section: Introductionmentioning
confidence: 99%