Duplication Based One-to-many Coding for Trojan HW Detection

被引:3
|
作者
Keren, Osnat [1 ]
Levin, Ilya [2 ]
Karpovsky, Mark [3 ]
机构
[1] Bar Ilan Univ, Sch Engn, Ramat Gan, Israel
[2] Tel Aviv Univ, Sch Engn, Tel Aviv, Israel
[3] Boston Univ, Dept Elect & Comp Engn, Boston, MA 02215 USA
关键词
ERROR-DETECTION; CIRCUITS; DESIGN;
D O I
10.1109/DFT.2010.26
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A functional unit having multiple errors on its output may be considered as a computational channel, in which there is no restriction on the direction and the number of bit-flips. This model characterizes the distortion of the output caused by an active Trojan hardware. In this paper, we present a Concurrent Error Detection (CED) scheme that detects an active Trojan with high probability within a given time. The suggested CED scheme consists of a duplication-based one-to-many code that protects the most probable, valuable, or vulnerable words that may appear on the output of the system.
引用
收藏
页码:160 / 166
页数:7
相关论文
共 50 条
  • [41] A scalable multicast architecture for one-to-many telepresentations
    Gemmell, J
    Schooler, E
    Kermode, R
    IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS, 1998, : 128 - 139
  • [42] One-to-Many Monotonic Concession Negotiation Protocol
    Badica, Costin
    Scafes, Mihnea
    PROCEEDINGS OF THE 2009 FOURTH BALKAN CONFERENCE IN INFORMATICS, 2009, : 8 - 13
  • [43] ONE-TO-MANY DISTRIBUTION WITH TRANSSHIPMENTS - AN ANALYTIC MODEL
    CAMPBELL, JF
    TRANSPORTATION SCIENCE, 1993, 27 (04) : 330 - 340
  • [44] Improved visibility in one-to-many trace concretization
    Nanshi, Kuntal
    Somenzi, Fabio
    2008 DESIGN, AUTOMATION AND TEST IN EUROPE, VOLS 1-3, 2008, : 698 - 703
  • [45] Evaluating Workload in One-to-Many Remote Collaboration
    Wang, Tzu-Yang
    Otsuki, Mai
    Kuzuoka, Hideaki
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON PERVASIVE TECHNOLOGIES RELATED TO ASSISTIVE ENVIRONMENTS, PETRA 2022, 2022, : 296 - 297
  • [46] Alternating-offers bargaining in one-to-many and many-to-many settings
    Bo An
    Nicola Gatti
    Victor Lesser
    Annals of Mathematics and Artificial Intelligence, 2016, 77 : 67 - 103
  • [47] Typing one-to-one and one-to-many correspondences in security protocols
    Gordoni, AD
    Jeffrey, A
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 263 - 282
  • [48] One-to-Many Spectral Upsampling of Reflectances and Transmittances
    Belcour, L.
    Barla, P.
    Guennebaud, G.
    COMPUTER GRAPHICS FORUM, 2023, 42 (04)
  • [49] Influencing Models in Automated One-to-Many Negotiation
    Kapani, Kapil
    Gupta, Arobinda
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 439 - 444
  • [50] Coevolutionary dynamics in one-to-many mutualistic systems
    Hideo Ezoe
    Theoretical Ecology, 2016, 9 : 381 - 388