Efficient hardware trojan diagnosis in SRAM based on FPGA processors using inject detect masking algorithm for multimedia signal Processors

Abstract The multimedia processor is the most powerful and challenging application in real-time world where Hardware Trojans (HTs) is a significant threat in most of the electronic devices which use Integrated Circuit (IC) as a crucial component. Since IC is manufactured by most of the untrusted designers, there is a possibility of inserting malicious attacks in any stages of fabrication. It is mainly added by an antagonist into the storage cell to make a detection process is a complex task, which creates an impact in the function of the device. To mitigate these issues, an IDM (Inject Detect Masking) algorithm is proposed, and it is implemented in a Look-Up Table (LUT) design, which exploited Stability Enhancing Static Random Access Memory (SESRAM) cell for storing the data bits. HT is injected at the output of the SESRAM cell, and then masking is applied to mitigate the HT. The proposed Inject Detect Masking (IDM) algorithm is designed and simulated in Tanner EDA with 125 nm technology. It is used to multimedia signal processors world in real-time applications to achieve better response in processor end solutions. It increases the detection rate by 8.88%, 8.88%, 5.37%, 4.25% and correction coverage by 5.26%, 28.20%, 21.95%, 13.63%, 11.11%, 7.52% when compared with Online Checking Technique, Simultaneous Orthogonal Matching Pursuit (SOMP) algorithm, Multiple Excitation of Rare Switching (MERS), LMDet and Clustering Ensemble-based Detection respectively.

[1]  Yiyu Shi,et al.  Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding , 2018, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[2]  Yu Wang,et al.  A General Framework for Hardware Trojan Detection in Digital Circuits by Statistical Learning Algorithms , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[3]  Laurent Njilla,et al.  Thwarting Security Threats From Malicious FPGA Tools With Novel FPGA-Oriented Moving Target Defense , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[4]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[5]  Yu Wang,et al.  Hardware Trojan Detection in Third-Party Digital Intellectual Property Cores by Multilevel Feature Analysis , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[6]  Omer Khan,et al.  Advancing the State-of-the-Art in Hardware Trojans Detection , 2019, IEEE Transactions on Dependable and Secure Computing.

[7]  Yiqiang Zhao,et al.  Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[8]  Saiyu Ren,et al.  Self-Reference-Based Hardware Trojan Detection , 2018, IEEE Transactions on Semiconductor Manufacturing.

[9]  Jian Wang,et al.  Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method , 2019, IEEE Access.

[10]  Jimson Mathew,et al.  A Flexible Online Checking Technique to Enhance Hardware Trojan Horse Detectability by Reliability Analysis , 2017, IEEE Transactions on Emerging Topics in Computing.

[11]  Huawei Li,et al.  LMDet: A “Naturalness” Statistical Method for Hardware Trojan Detection , 2018, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[12]  Swarup Bhunia,et al.  Scalable Test Generation for Trojan Detection Using Side Channel Analysis , 2018, IEEE Transactions on Information Forensics and Security.

[13]  Pedro Reviriego,et al.  Protecting Image Processing Pipelines against Configuration Memory Errors in SRAM-Based FPGAs , 2018 .

[14]  Muhammad Rashid,et al.  A high performance processor architecture for multimedia applications , 2018, Comput. Electr. Eng..

[15]  Yang Yang,et al.  A Multi-Layer Hardware Trojan Protection Framework for IoT Chips , 2019, IEEE Access.

[16]  Tsutomu Matsumoto,et al.  A Demonstration of a HT-Detection Method Based on Impedance Measurements of the Wiring Around ICs , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.

[17]  Ahmad Patooghy,et al.  Circuit enclaves susceptible to hardware Trojans insertion at gate-level designs , 2018, IET Comput. Digit. Tech..

[18]  Walid Saad,et al.  Hardware Trojan Detection Game: A Prospect-Theoretic Approach , 2017, IEEE Transactions on Vehicular Technology.

[19]  Swarup Bhunia,et al.  Hardware Trojan attacks in embedded memory , 2018, 2018 IEEE 36th VLSI Test Symposium (VTS).