Real-Time SoC Security against Passive Threats Using Crypsis Behavior of Geckos
Citations
9 citations
7 citations
Cites background from "Real-Time SoC Security against Pass..."
...Mitigating passive threats via on-chip self-awareness was demonstrated in Guha et al. (2015, 2017b)....
[...]
...…various phases of Very Large Scale Integration (VLSI) design across This article is an extended version of a previously published conference research paper from the 30th International Conference on VLSI Design and the 16th International Conference on Embedded Systems (VLSID’17) (Guha et al. 2017a)....
[...]
...However, for causing an infinite delay, the payload may be composed of a simple loop architecture with a buffer inside, where for each operation, one unit of delay is caused and the progress is never made (Guha et al. 2017a)....
[...]
...Other than outsourcing the various phases of Very Large Scale Integration (VLSI) design across This article is an extended version of a previously published conference research paper from the 30th International Conference on VLSI Design and the 16th International Conference on Embedded Systems (VLSID’17) (Guha et al. 2017a)....
[...]
...Passive threats affect the confidentiality of the system (e.g., leakage of secret information) (Guha et al. 2017b)....
[...]
6 citations
Cites background from "Real-Time SoC Security against Pass..."
...hardware Trojan is small, the increase in the side-channel parameters is too small to detect [14]....
[...]
...However, the side-channel-based techniques are ineffective when the size of the hardware Trojans is negligible when compared to the size of the SoC [14]....
[...]
4 citations
1 citations
References
26 citations
"Real-Time SoC Security against Pass..." refers background or methods in this paper
...Active threats relate to the scenario where the system suddenly malperforms by producing erroneous results or no results in a perfectly fine operating environment [Amin et al. 2014; McIntyre et al. 2009]....
[...]
...2009] or a weighted voting technique [Amin et al. 2014] where the majority result is selected for output generation....
[...]
...The output is chosen with the aid of a comparison technique [McIntyre et al. 2009] or a weighted voting technique [Amin et al. 2014] where the majority result is selected for output generation....
[...]
...2009] or a weighted voting methodology [Amin et al. 2014] is utilized to select the majority result for output generation....
[...]
...A comparison technique [McIntyre et al. 2009] or a weighted voting methodology [Amin et al. 2014] is utilized to select the majority result for output generation....
[...]
23 citations
"Real-Time SoC Security against Pass..." refers background in this paper
...Many researchers associate it as a secondary response where the nervous or endocrine system of the organism is involved, while others attribute it as a primary response where special dedicated cells are present for cryptic coloration [Oshima et al. 1998]....
[...]
...Crypsis can be either a primary or a secondary response [Oshima et al. 1998; Fulgione et al. 2014]....
[...]
23 citations
"Real-Time SoC Security against Pass..." refers background in this paper
...Crypsis can be either a primary or a secondary response [Oshima et al. 1998; Fulgione et al. 2014]....
[...]
...However, we choose crypsis in geckos due to the fact that only the light-sensitive skin cells are primarily involved for crypsis in geckos [Fulgione et al. 2014]....
[...]
...This stimulus involves the activation of melanophores via alpha-melanophore-stimulating hormone (α-MSH), effecting learning of the new state of the environment by geckos [Fulgione et al. 2014]....
[...]
...However, a recent study reveals that special light-sensitive cells are present on the skin of a gecko that are responsible for its crypsis [Fulgione et al. 2014]....
[...]
...Synchronizing its parameters to the parameters of its surroundings or updating its existing state with the change in environment facilitates the organism to bypass its threats and evolve in nature [Fulgione et al. 2014; Vroonen et al. 2012]....
[...]
16 citations
13 citations
"Real-Time SoC Security against Pass..." refers methods in this paper
...Nature-inspired algorithms offer an alternative to the conventional techniques for solving complex problems in the domain of computer science....
[...]
...In this strategy of This is an extended version of a previously published conference research paper [Guha et al. 2015]....
[...]