Effect of hardware Trojans on the performance of a coded communication system

Pernicious Trojan circuits inserted during the design or fabrication phases of an integrated circuit may cause undesirable effects in the designed system. In the case of communication systems, incorrect decoding of the received information is an issue that may lead to serious consequences. In this paper, we study the performance degradation of a noisy coded communication system, due to the presence of hardware Trojans in the decoding unit. It can be seen that the Trojans have negligible effect at low SNRs while there is a statistically significant increase in the bit error rate (p < 0.01) at higher SNRs. At high SNRs, we expect the bit error rate to tend towards zero, but it is observed that even with the Trojan being activated only once during the entire duration of the transmission, there is a constant bit error rate of the order of 10−4.

[1]  Mark Mohammad Tehranipoor,et al.  Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.

[2]  Alain Glavieux,et al.  Reflections on the Prize Paper : "Near optimum error-correcting coding and decoding: turbo codes" , 1998 .

[3]  Kaushik Roy,et al.  Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis , 2013, IEEE Transactions on Computers.

[4]  B. Yamuna,et al.  A minimal search soft decision list decoding algorithm for Reed-Solomon codes , 2014, Int. J. Inf. Commun. Technol..

[5]  David Chase,et al.  Class of algorithms for decoding block codes with channel measurement information , 1972, IEEE Trans. Inf. Theory.

[6]  B. Yamuna,et al.  A Reliability Level List based SDD Algorithm for Binary Cyclic Block Codes , 2012, Int. J. Comput. Commun. Control.

[7]  Swarup Bhunia,et al.  Hardware Trojan: Threats and emerging solutions , 2009, 2009 IEEE International High Level Design Validation and Test Workshop.

[8]  Jos H. Weber Low-complexity Chase-like bounded-distance decoding algorithms , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[9]  Swarup Bhunia,et al.  On-demand transparency for improving hardware Trojan detectability , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[10]  Van Nostrand,et al.  Error Bounds for Convolutional Codes and an Asymptotically Optimum Decoding Algorithm , 1967 .

[11]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[12]  Daniel J. Costello,et al.  Error Control Coding, Second Edition , 2004 .

[13]  Peter Sweeney,et al.  Error Control Coding: From Theory to Practice , 2002 .

[14]  Karthikeyan Lingasubramanian,et al.  Effective usage of redundancy to aid neutralization of hardware Trojans in Integrated Circuits , 2017, Integr..

[15]  Jr. G. Forney,et al.  The viterbi algorithm , 1973 .