RTNA: Securing SOC architectures from confidentiality attacks at runtime using ART1 neural networks
Citations
90 citations
Cites background or methods or result from "RTNA: Securing SOC architectures fr..."
...Then, these features were input into the SNNs and learned to reveal the abnormal operations....
[...]
...BPNNs can adjust the network weights and thresholds during training to achieve a nonlinear mapping of the input and output as well as better generalization ability....
[...]
...Krishnendu et al. introduced a runtime trust neural architecture (RTNA) based on adaptive resonance theory (ART1) NNs [114]....
[...]
...Especially for wireless crypto ICs, for example, trust evaluation architecture established through on-chip ANNs [76], the incorporation of ML models can reduce the false positive rate (FPR) and false negative rate (FNR) and can effectively identify Trojans activated during operation....
[...]
...For SoC chips, for example, RNTA [114], ART1 NNs can be applied as an on-chip module to provide confidentiality protection for SoCs....
[...]
17 citations
Cites background from "RTNA: Securing SOC architectures fr..."
...It may affect system integrity by generating erroneous output [5], or it may affect the confidentiality of the system by leaking secret information [8]....
[...]
...A self aware approach facilitating security from confidentiality attacks at runtime is proposed in [8]....
[...]
9 citations
9 citations
Cites background from "RTNA: Securing SOC architectures fr..."
...Counteracting HTH attacks can be performed via several techniques, which range from offline detection [20, 21] to authentication mechanisms [22, 23] to runtime security methodologies, that may be redundancy based [16, 24] or self-aware [19, 25]....
[...]
...These can be broadly classified into redundancy based methodologies [16, 24] or self-aware approaches [19, 25, 30]....
[...]
...In prior works, use of self-aware strategy for mitigating integrity attacks [27], confidentiality attacks [17, 25] and availability attacks [18, 19] of HTHs have been explored, which ensures secure execution of real-time tasks on hardware platforms....
[...]
8 citations
Cites methods from "RTNA: Securing SOC architectures fr..."
...Nature-inspired algorithms offer an alternative to the conventional techniques for solving complex problems in the domain of computer science....
[...]
...In this strategy of This is an extended version of a previously published conference research paper [Guha et al. 2015]....
[...]
References
1,227 citations
1,217 citations
"RTNA: Securing SOC architectures fr..." refers background in this paper
...ART [25], [26] is a neural network which facilitates autonomous learning in a complex environment....
[...]
...AES [25] is a 128 bit block non- Feistel cipher....
[...]
...DES [25] is a 64 bit block cipher consisting of 16 Feistel rounds along with a key generation module and two permutation modules....
[...]
...Adaptive Resonance Theory (ART1) neural networks [25], [26] exhibit unsupervised learning in an unknown environment....
[...]
1,196 citations
854 citations
588 citations