Hussain Musharraf, Baloach Naveed Khan, Ali Gauhar, ElAffendi Mohammed, Dhaou Imed Ben, Ullah Syed Sajid, Uddin Mueen
Faculty of Computer Science, The University of Lahore, Islamabad Campus, Islamabad 44000, Pakistan.
Faculty of Computer Engineering, University of Engineering and Technology, Taxila 47050, Pakistan.
Micromachines (Basel). 2023 Apr 8;14(4):828. doi: 10.3390/mi14040828.
Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods have been proposed to detect and mitigate these HTs in general integrated circuits. However, insufficient effort has been made for hardware Trojans (HTs) in the network-on-chip. In this study, we implement a countermeasure to congeal the network-on-chip hardware design in order to prevent changes from being made to the network-on-chip design. We propose a collaborative method which uses flit integrity and dynamic flit permutation to eliminate the hardware Trojan inserted into the router of the NoC by a disloyal employee or a third-party vendor corporation. The proposed method increases the number of received packets by up to 10% more compared to existing techniques, which contain HTs in the destination address of the flit. Compared to the runtime HT mitigation method, the proposed scheme also decreases the average latency for the hardware Trojan inserted in the flit's header, tail, and destination field up to 14.7%, 8%, and 3%, respectively.
由于半导体行业的全球化,硬件电路中出现的恶意修改,即硬件木马(HTs),使得芯片安全变得至关重要。多年来,人们提出了许多方法来检测和减轻通用集成电路中的这些硬件木马。然而,针对片上网络中的硬件木马所做的工作却不够。在本研究中,我们实施了一种对策来固化片上网络硬件设计,以防止对片上网络设计进行更改。我们提出了一种协作方法,该方法使用微片完整性和动态微片置换来消除由不忠诚的员工或第三方供应商公司插入到片上网络路由器中的硬件木马。与现有技术相比,所提出的方法在微片目的地址中包含硬件木马的情况下,接收数据包的数量最多可增加10%。与运行时硬件木马缓解方法相比,所提出的方案还分别将插入到微片头、尾和目的字段中的硬件木马的平均延迟降低了14.7%、8%和3%。