Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/3050
Full metadata record
DC FieldValueLanguage
dc.contributor.authorManoj Kumar, JYV-
dc.contributor.authorSwain, Ayas Kanta-
dc.contributor.authorKumar, Sudeendra-
dc.contributor.authorSahoo, Sauvagya Ranjan-
dc.contributor.authorMahapatra, KamalaKanta-
dc.date.accessioned2018-08-31T12:23:27Z-
dc.date.available2018-08-31T12:23:27Z-
dc.date.issued2018-07-
dc.identifier.citationIEEE Computer Society Annual Symposium on VLSI,8-11 July 2018, Hong Kong SAR, Chinaen_US
dc.identifier.uri10.1109/ISVLSI.2018.00139-
dc.identifier.urihttp://hdl.handle.net/2080/3050-
dc.descriptionCopyright of this paper belongs to proceedings publisher.en_US
dc.description.abstractGlobalization of semiconductor design and manufacturing has led to several hardware security issues. The problem of Hardware Trojans (HT) is one such security issue discussed widely in industry and academia. Adversary design engineer can insert the HT to leak confidential data, cause a denial of service attack or any other intention specific to the design. HT in cryptographic modules and processors are widely discussed. HT in Multi-Processor System on Chips n(MPSoC) are also catastrophic, as most of the military applications use MPSoCs. Network on Chips (NoC) are standard communication infrastructure in modern day MPSoC. In this paper, we present a novel hardware Trojan which is capable of inducing performance degradation and denial of service attacks in a NoC. The presence of the Hardware Trojan in a NoC can compromise the crucial details of packets communicated through NoC. The proposed Trojan is triggered by a particular complex bit pattern from input messages and tries to mislead the packets away from the destined addresses. A mitigation method based on bit shuffling mechanism inside the router with a key directly extracted from input message is proposed to limit the adverse effects of the Trojan. The performance of a 4x4 NoC is evaluated under uniform traffic with the proposed Trojan and mitigation method. Simulation results show that the proposed mitigation scheme is useful in limiting the malicious effect of hardware Trojan.en_US
dc.subjectHardware Trojanen_US
dc.subjectRouter Architectureen_US
dc.titleRun Time Mitigation of Performance Degradation Hardware Trojan Attacks in Network on Chipen_US
dc.typeArticleen_US
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
2018_ISVLSI_ManojKumar_RunTime.pdf539.99 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.