Duplication Based One-to-many Coding for Trojan HW Detection

被引:3
|
作者
Keren, Osnat [1 ]
Levin, Ilya [2 ]
Karpovsky, Mark [3 ]
机构
[1] Bar Ilan Univ, Sch Engn, Ramat Gan, Israel
[2] Tel Aviv Univ, Sch Engn, Tel Aviv, Israel
[3] Boston Univ, Dept Elect & Comp Engn, Boston, MA 02215 USA
关键词
ERROR-DETECTION; CIRCUITS; DESIGN;
D O I
10.1109/DFT.2010.26
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A functional unit having multiple errors on its output may be considered as a computational channel, in which there is no restriction on the direction and the number of bit-flips. This model characterizes the distortion of the output caused by an active Trojan hardware. In this paper, we present a Concurrent Error Detection (CED) scheme that detects an active Trojan with high probability within a given time. The suggested CED scheme consists of a duplication-based one-to-many code that protects the most probable, valuable, or vulnerable words that may appear on the output of the system.
引用
收藏
页码:160 / 166
页数:7
相关论文
共 50 条
  • [1] COMMON CODING BY PIGEONS IN A SPATIAL ONE-TO-MANY MATCHING TASK
    ZENTALL, TR
    STEIRN, JN
    SHERBURNE, LM
    URCUIOLI, PJ
    BULLETIN OF THE PSYCHONOMIC SOCIETY, 1990, 28 (06) : 521 - 521
  • [2] One-to-many and many-to-one voice conversion based on eigenvoices
    Toda, Tomoki
    Ohtani, Yamato
    Shikano, Kiyohiro
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL IV, PTS 1-3, 2007, : 1249 - +
  • [3] DECENTRALIZED ONE-TO-MANY BARGAINING
    Ko, Chiu Yu
    Li, Duozhe
    INTERNATIONAL ECONOMIC REVIEW, 2020, 61 (03) : 1139 - 1172
  • [4] ARGUMENTATION-BASED ONE-TO-MANY NEGOTIATION MODEL
    Jiang, Guorui
    Chen, Sheng
    ICISO 2010: PROCEEDINGS OF THE TWELFTH INTERNATIONAL CONFERENCE ON INFORMATICS AND SEMIOTICS IN ORGANISATIONS, 2010, : 268 - 274
  • [5] A Lookup Tree Based Security for One-To-Many Communication
    Abuelyaman, Eltayeb
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1292 - 1296
  • [6] One-to-many File Transfers Using Multipath-Multicast With Coding at Source
    Ogawa, Kyohei
    Iwamoto, Takeshi
    Tsuru, Masato
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 687 - 694
  • [7] One-to-Many Single Entity Electrochemistry Biosensing for Ultrasensitive Detection of microRNA
    Bai, Yi-Yan
    Wu, Zhen
    Xu, Chun-Miao
    Zhang, Li
    Feng, Jiao
    Pang, Dai-Wen
    Zhang, Zhi-Ling
    ANALYTICAL CHEMISTRY, 2020, 92 (01) : 853 - 858
  • [8] Coded-MPMC: One-to-Many Transfer Using Multipath Multicast With Sender Coding
    Kurata, Masayuki
    Shibata, Masahiro
    Tsuru, Masato
    IEEE ACCESS, 2021, 9 : 49292 - 49307
  • [9] One-to-Many: Context-Oriented Code for Concurrent Error Detection
    Keren, Osnat
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2010, 26 (03): : 337 - 353
  • [10] An Approach to One-to-Many Concurrent Negotiation
    Mansour, Khalid
    Kowalczyk, Ryszard
    GROUP DECISION AND NEGOTIATION, 2015, 24 (01) : 45 - 66