scispace - formally typeset
Proceedings ArticleDOI

Effect of sign-bit-flipping trojan on turbo coded communication systems

Reads0
Chats0
TLDR
Simulations were carried out on a conventional iterative turbo decoder and the results point out that the Trojan affects the performance of the decoder at SNRs greater than -2 dB.
Abstract
In complex systems like 'Internet of Things' and 'Cyber Physical Systems', reliable communication is made possible by the use of error control codes like turbo codes. Such systems are vulnerable to attack by Trojans during the design or fabrication phases of IC manufacturing. This leads to a severe performance degradation of the entire system. This paper aims at analyzing the effect of a sign-bit-flipping Trojan on a turbo coded communication system. Simulations were carried out on a conventional iterative turbo decoder and the results point out that the Trojan affects the performance of the decoder at SNRs greater than -2 dB. This performance degradation is seen even with minimal activation of the Trojan and a finite error persists even at very high SNRs.

read more

Citations
More filters
Posted Content

Boosting the Bounds of Symbolic QED for Effective Pre-Silicon Verification of Processor Cores

TL;DR: In this paper, the authors leverage Symbolic Quick Error Detection (Symbolic QED or SQED), a recent bug detection and localization technique using Bounded Model Checking (BMC), and Symbolic starting states, to present a method that effectively detects both "difficult" logic bugs and hardware Trojans, even with long activation sequences where traditional BMC techniques fail.
References
More filters
Journal ArticleDOI

A Survey of Hardware Trojan Taxonomy and Detection

TL;DR: A classification of hardware Trojans and a survey of published techniques for Trojan detection are presented.
Journal ArticleDOI

Trustworthy Hardware: Identifying and Classifying Hardware Trojans

TL;DR: A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
Proceedings ArticleDOI

Hardware Trojan: Threats and emerging solutions

TL;DR: The threat posed by hardware Trojans and the methods of deterring them are analyzed, a Trojan taxonomy, models of Trojan operations and a review of the state-of-the-art Trojan prevention and detection techniques are presented.
Journal ArticleDOI

Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis

TL;DR: A novel noninvasive, multiple-parameter side-channel analysisbased Trojan detection approach that uses the intrinsic relationship between dynamic current and maximum operating frequency of a circuit to isolate the effect of a Trojan circuit from process noise.
Related Papers (5)