Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)

dc.contributor.authorHussain Musharraf
dc.contributor.authorBaloach Naveed Khan
dc.contributor.authorAli Gauhar
dc.contributor.authorElAffendi Mohammed
dc.contributor.authorBen Dhaou Imed
dc.contributor.authorUllah Syed Sajid
dc.contributor.authorUddin Mueen
dc.contributor.organizationfi=tietotekniikan laitos|en=Department of Computing|
dc.contributor.organization-code1.2.246.10.2458963.20.85312822902
dc.converis.publication-id179711777
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/179711777
dc.date.accessioned2025-08-27T22:16:48Z
dc.date.available2025-08-27T22:16:48Z
dc.description.abstractDue to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in general integrated circuits. However, insufficient effort has been made for hardware Trojans (HTs) in the network-on-chip. In this study, we implement a countermeasure to congeal the network-on-chip hardware design in order to prevent changes from being made to the network-on-chip design. We propose a collaborative method which uses flit integrity and dynamic flit permutation to eliminate the hardware Trojan inserted into the router of the NoC by a disloyal employee or a third-party vendor corporation. The proposed method increases the number of received packets by up to 10% more compared to existing techniques, which contain HTs in the destination address of the flit. Compared to the runtime HT mitigation method, the proposed scheme also decreases the average latency for the hardware Trojan inserted in the flit's header, tail, and destination field up to 14.7%, 8%, and 3%, respectively.
dc.identifier.jour-issn2072-666X
dc.identifier.olddbid201910
dc.identifier.oldhandle10024/184937
dc.identifier.urihttps://www.utupub.fi/handle/11111/32258
dc.identifier.urlhttps://www.mdpi.com/2072-666X/14/4/828
dc.identifier.urnURN:NBN:fi-fe2025082785554
dc.language.isoen
dc.okm.affiliatedauthorBen Dhaou, Imed
dc.okm.discipline213 Electronic, automation and communications engineering, electronicsen_GB
dc.okm.discipline213 Sähkö-, automaatio- ja tietoliikennetekniikka, elektroniikkafi_FI
dc.okm.internationalcopublicationinternational co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA1 ScientificArticle
dc.publisherMDPI
dc.publisher.countrySwitzerlanden_GB
dc.publisher.countrySveitsifi_FI
dc.publisher.country-codeCH
dc.relation.articlenumber828
dc.relation.doi10.3390/mi14040828
dc.relation.ispartofjournalMicromachines
dc.relation.issue4
dc.relation.volume14
dc.source.identifierhttps://www.utupub.fi/handle/10024/184937
dc.titleHardware Trojan Mitigation Technique in Network-on-Chip (NoC)
dc.year.issued2023

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
micromachines-14-00828.pdf
Size:
24.13 MB
Format:
Adobe Portable Document Format