Suppr超能文献

一种维特比译码器及其硬件木马模型:基于现场可编程门阵列的实现研究。

A Viterbi decoder and its hardware Trojan models: an FPGA-based implementation study.

作者信息

Kakkara Varsha, Balasubramanian Karthi, Yamuna B, Mishra Deepak, Lingasubramanian Karthikeyan, Murugan Senthil

机构信息

Department of Electronics and Communication Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, India.

Digital Communication Division (DCD), Optical and Digital Communication Group (ODCG), Satcom Navigation Payload Area (SNPA), Space Application Center (SAC), ISRO, Ahmedabad, Gujarat, India.

出版信息

PeerJ Comput Sci. 2020 Mar 2;6:e250. doi: 10.7717/peerj-cs.250. eCollection 2020.

Abstract

Integrated circuits may be vulnerable to hardware Trojan attacks during its design or fabrication phases. This article is a case study of the design of a Viterbi decoder and the effect of hardware Trojans on a coded communication system employing the Viterbi decoder. Design of a Viterbi decoder and possible hardware Trojan models for the same are proposed. An FPGA-based implementation of the decoder and the associated Trojan circuits have been discussed. The noise-added encoded input data stream is stored in the block RAM of the FPGA and the decoded data stream is monitored on the PC through an universal asynchronous receiver transmitter interface. The implementation results show that there is barely any change in the LUTs used (0.5%) and power dissipation (3%) due to the insertion of the proposed Trojan circuits, thus establishing the surreptitious nature of the Trojan. In spite of the fact that the Trojans cause negligible changes in the circuit parameters, there are significant changes in the bit error rate (BER) due to the presence of Trojans. In the absence of Trojans, BER drops down to zero for signal to noise rations (SNRs) higher than 6 dB, but with the presence of Trojans, BER doesn't reduce to zero even at a very high SNRs. This is true even with the Trojan being activated only once during the entire duration of the transmission.

摘要

集成电路在其设计或制造阶段可能容易受到硬件木马攻击。本文是一个关于维特比译码器设计以及硬件木马对采用维特比译码器的编码通信系统影响的案例研究。提出了维特比译码器的设计以及针对该译码器的可能硬件木马模型。讨论了基于现场可编程门阵列(FPGA)的译码器及相关木马电路的实现。添加噪声后的编码输入数据流存储在FPGA的块随机存取存储器(block RAM)中,译码后的数据流通过通用异步收发器接口在个人计算机(PC)上进行监测。实现结果表明,由于插入了所提出的木马电路,所使用的查找表(LUTs)(0.5%)和功耗(3%)几乎没有任何变化,从而证实了木马的隐秘性。尽管木马对电路参数造成的变化可忽略不计,但由于木马的存在,误码率(BER)有显著变化。在没有木马的情况下,对于高于6 dB的信噪比(SNR),误码率降至零,但在有木马的情况下,即使在非常高的信噪比下误码率也不会降至零。即使在整个传输过程中木马仅被激活一次,情况也是如此。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e2b5/7924523/011ae13cfb70/peerj-cs-06-250-g001.jpg

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验