RTNA: Securing SOC architectures from confidentiality attacks at runtime using ART1 neural networks

Research output: Chapter in Book/Report/Conference proceedingsChapterpeer-review

Abstract

With the entry into the embedded domain, security of SOC architectures has become an arena of importance. However, complexity and cost factors have forced us to outsource the VLSI design phases across the globe. Such sites may not be trusted and threat lies in the introduction of malicious intrusions at any stage of the design flow. Such malicious intrusions, also known as Hardware Trojan Horses (HTH) remain dormant during the testing phase but get triggered at runtime and threaten the integrity and confidentiality of the chip. In this paper, we focus on threat to confidentiality. HTH threatens the confidentiality of such chips by leaking the secret information at runtime. We propose an intelligent architecture, Runtime Trust Neural Architecture (RTNA) based on Adaptive Resonance Theory (ART 1) neural network, which when incorporated with the SOC architecture can prevent it at runtime from being compromised confidentially. Low area and low power overhead of our proposed RTNA on practical crypto SOC architectures as obtained in the experimental results confirm its practical implementation. Hardware implementation of trust generation at runtime, use of unsupervised learning and use of an intelligent architecture are the novelties of this work.

Original languageEnglish
Title of host publication19th International Symposium on VLSI Design and Test, VDAT 2015 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479917433
DOIs
Publication statusPublished - 17 Aug 2015
Externally publishedYes
Event19th International Symposium on VLSI Design and Test, VDAT 2015 - Ahmedabad, India
Duration: 26 Jun 201529 Jun 2015

Publication series

Name19th International Symposium on VLSI Design and Test, VDAT 2015 - Proceedings

Conference

Conference19th International Symposium on VLSI Design and Test, VDAT 2015
Country/TerritoryIndia
CityAhmedabad
Period26/06/1529/06/15

Keywords

  • Adaptive Resonance Theory (ART)
  • Cryptocores
  • Hardware Trojan Horses (HTH)

Fingerprint

Dive into the research topics of 'RTNA: Securing SOC architectures from confidentiality attacks at runtime using ART1 neural networks'. Together they form a unique fingerprint.

Cite this