{"title":"Runtime Trojan Detection using Step-Based Reverse Function Redundancy Algorithm","authors":"Sa'ed Abed, B. Mohd, T. Hayajneh, M. Alshayeji","doi":"10.1109/ICEEE55327.2022.9772601","DOIUrl":null,"url":null,"abstract":"Lightweight ciphers are built to encrypt data in particular for resource-constrained devices (RCDs). Hardware Trojans (HTs) are integrated in lightweight chippers building designs to leak sensitive data. Runtime monitoring techniques effectively detects HTs, however, require significant resources (area, power and energy). Recently, runtime monitoring algorithm based on reverse-function redundancy (RFR) was proposed. RFR minimizes energy and power but requires significant area resources to implement critical nodes' monitors. The objective of this research is to develop a simplified runtime monitoring algorithm with minimal area resources, power and energy. The algorithm uses step-based reverse function redundancy (SRFR), facilitates design-for-trust and is targeted for lightweight ciphers in RCDs. Initially, several optimization techniques were examined and then incorporated in the proposed algorithm. Implementation results show that area resources were significantly reduced by 60%. Compared with RFR, SRFR algorithm decreases the power by 5 % and the energy by % 8.","PeriodicalId":375340,"journal":{"name":"2022 9th International Conference on Electrical and Electronics Engineering (ICEEE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 9th International Conference on Electrical and Electronics Engineering (ICEEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEEE55327.2022.9772601","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Lightweight ciphers are built to encrypt data in particular for resource-constrained devices (RCDs). Hardware Trojans (HTs) are integrated in lightweight chippers building designs to leak sensitive data. Runtime monitoring techniques effectively detects HTs, however, require significant resources (area, power and energy). Recently, runtime monitoring algorithm based on reverse-function redundancy (RFR) was proposed. RFR minimizes energy and power but requires significant area resources to implement critical nodes' monitors. The objective of this research is to develop a simplified runtime monitoring algorithm with minimal area resources, power and energy. The algorithm uses step-based reverse function redundancy (SRFR), facilitates design-for-trust and is targeted for lightweight ciphers in RCDs. Initially, several optimization techniques were examined and then incorporated in the proposed algorithm. Implementation results show that area resources were significantly reduced by 60%. Compared with RFR, SRFR algorithm decreases the power by 5 % and the energy by % 8.