Real-Time SoC Security against Passive Threats Using Crypsis Behavior of Geckos
Citations
9 citations
7 citations
Cites background from "Real-Time SoC Security against Pass..."
...Mitigating passive threats via on-chip self-awareness was demonstrated in Guha et al. (2015, 2017b)....
[...]
...…various phases of Very Large Scale Integration (VLSI) design across This article is an extended version of a previously published conference research paper from the 30th International Conference on VLSI Design and the 16th International Conference on Embedded Systems (VLSID’17) (Guha et al. 2017a)....
[...]
...However, for causing an infinite delay, the payload may be composed of a simple loop architecture with a buffer inside, where for each operation, one unit of delay is caused and the progress is never made (Guha et al. 2017a)....
[...]
...Other than outsourcing the various phases of Very Large Scale Integration (VLSI) design across This article is an extended version of a previously published conference research paper from the 30th International Conference on VLSI Design and the 16th International Conference on Embedded Systems (VLSID’17) (Guha et al. 2017a)....
[...]
...Passive threats affect the confidentiality of the system (e.g., leakage of secret information) (Guha et al. 2017b)....
[...]
6 citations
Cites background from "Real-Time SoC Security against Pass..."
...hardware Trojan is small, the increase in the side-channel parameters is too small to detect [14]....
[...]
...However, the side-channel-based techniques are ineffective when the size of the hardware Trojans is negligible when compared to the size of the SoC [14]....
[...]
4 citations
1 citations
References
75 citations
"Real-Time SoC Security against Pass..." refers methods in this paper
...A layout filler technique was proposed to prevent insertion of Trojans into the unused spaces of a layout [Xiao et al. 2014]....
[...]
51 citations
51 citations
"Real-Time SoC Security against Pass..." refers background or methods in this paper
...Degradation of performance due to aging is natural and is evident for all systems after a certain timeframe [Huang et al. 2015]....
[...]
...Statistical methodologies were also proposed [Huang et al. 2015]....
[...]
42 citations
"Real-Time SoC Security against Pass..." refers background in this paper
...Synchronizing its parameters to the parameters of its surroundings or updating its existing state with the change in environment facilitates the organism to bypass its threats and evolve in nature [Fulgione et al. 2014; Vroonen et al. 2012]....
[...]
...Geckos change their dorsal color in response to changes in the colors of their environment [Vroonen et al. 2012]....
[...]
...” Geckos change their dorsal color in response to changes in the colors of their environment [Vroonen et al. 2012]....
[...]
...Crypsis is a common security methodology adopted by several natural species in order to avoid detection by its predators [Vroonen et al. 2012]....
[...]
34 citations
"Real-Time SoC Security against Pass..." refers background in this paper
...These two criteria are commonly termed distribution due to diversity constraints [Liu et al. 2014]....
[...]
...Moreover, serious concern has recently been raised regarding the trustworthiness of the IPs procured from thirdparty IP vendors [Liu et al. 2014]....
[...]
...However, trustworthiness of these third-party vendors is a concern [Liu et al. 2014]....
[...]