Reliability Driven Mixed Critical Tasks Processing on FPGAs Against Hardware Trojan Attacks
Citations
12 citations
Cites background from "Reliability Driven Mixed Critical T..."
...[115] have proposed a reliability driven scheduling approach for mixed-criticality tasks by handling periodic, aperiodic, and sporadic tasks on FPGAs against hardware trojan horse attacks....
[...]
9 citations
6 citations
4 citations
Cites background from "Reliability Driven Mixed Critical T..."
...A recent study has explored how reliability can be ensured for mixed critical task execution from HTH attacks at runtime [16]....
[...]
3 citations
Cites background or methods from "Reliability Driven Mixed Critical T..."
...Our technique produces results for all accepted tasks with any level of criticality contrary to the technique [12], fails to produce results for the accepted tasks with medium criticality, which causes loss of reputation of the Cloud working on pay-per-use basis....
[...]
...In each of these works [12, 14, 15] on Trojan or fault-aware scheduling of FPGA-based tasks, the FPGA is equi-partitioned into large-enough homogeneous partitions such that any arbitrary task may be feasibly mapped into any partition....
[...]
...For scheduling real-time tasks on FPGA-based embedded systems, the authors of Reference [12] consider error-producing HTH as well as delayinducing HTH for the tasks with different criticality levels and propose dual or triple execution of the affected task by expanding the task schedule....
[...]
...Sch_TrojAWR is compared with an existing Trojan-aware scheduling [12] that has considered deadline tasks only to be scheduled on Zynq 7 series FPGA....
[...]
...For cases with more than 80% deadline tasks, the work in Reference [12] rejects a significantly larger number of tasks compared to ours, and as the existing timing resource is distributed along the accepted tasks, it shows slightly lower WCRT for this range....
[...]
References
588 citations
"Reliability Driven Mixed Critical T..." refers background in this paper
...A survey of the prevalent HTH counteracting techniques is discussed in [5]....
[...]
...The globalization strategy involves outsourcing of various phases of SoC design across the globe and procuring of intellectual properties (IPs) from various third party intellectual property (3PIP) vendors [5]....
[...]
...However, eviction of the hardware root of trust has been illustrated in the last decade by many eminent researchers [5]....
[...]
411 citations
Additional excerpts
...Logic testing involves creation of test vectors to trigger malicious effects of HTHs during testing and detect them [8]....
[...]
207 citations
"Reliability Driven Mixed Critical T..." refers methods in this paper
...Side channel analysis takes the aid of side channel parameters like delay, power, leakage current, etc to detect presence of an HTH in the experimental model, with respect to a reference or golden model [9]....
[...]
75 citations
"Reliability Driven Mixed Critical T..." refers background in this paper
...Redundancy with polling techniques basically duplicates or triplicates an operation to ensure trust with IPs procured from a number of sources [13]....
[...]
67 citations
"Reliability Driven Mixed Critical T..." refers background or methods in this paper
...Several works on reliability driven mixed critical tasks scheduling exist [3], [4]....
[...]
...2) FD for C2 Tasks: Dual redundancy or two times task execution, followed by result checking is the generic technique to ensure reliability for C2 tasks in a mixed critical scheduling environment [3]....
[...]
...1) FDC for C1 Tasks: For reliable mixed critical task scheduling on generic processors, a triple redundancy in task execution followed by a majority polling operation is needed [3]....
[...]
...The degree of reliability needed to ensure safety varies with the criticality of mixed critical tasks [3]....
[...]
...Such systems are generally mixed critical, where different tasks need to be executed in a common platform to optimize resource and reduce design cost and energy consumption [3]....
[...]