Skip to main content

Abstract

Passive is the threat when system confidentiality is at stake. Such threats do not cause direct damage by jeopardizing operations and generating erroneous results or causing stoppage of operations or even does not delay real time operations to cause a deadline miss. Hence, such threats are passive in nature. This involves leakage of secret information to adversaries [LJM13, GSC17a, GSC15]. For example, the secret key that is associated with cryptographic operations by a genuine user may be leaked to an adversary.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. J. Aarestad, D. Acharyya, R. Rad, J. Plusquellic, Detecting trojans through leakage current analysis using multiple supply pad\({I}_{\rm DDQ}\)s. IEEE Trans. Inf. Forensics Secur. 5(4), 893–904 (2010)

    Article  Google Scholar 

  2. A. Askarov, D. Zhang, A.C. Myers, Predictive black-box mitigation of timing channels, in Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS ’10 (2010), pp. 297–307

    Google Scholar 

  3. R.S. Chakraborty, S. Bhunia, Security against hardware trojan attacks using key-based design obfuscation. J. Electron. Test. 27(6), 767–785 (2011)

    Article  Google Scholar 

  4. K. Guha, D. Saha, A. Chakrabarti, RTNA: securing SOC architectures from confidentiality attacks at runtime using ART1 neural networks, in 2015 19th International Symposium on VLSI Design and Test (2015), pp. 1–6

    Google Scholar 

  5. K. Guha, D. Saha, A. Chakrabarti, Real-time soc security against passive threats using crypsis behavior of geckos. J. Emerg. Technol. Comput. Syst. 13(3), 41:1–41:26 (2017)

    Google Scholar 

  6. K. Guha, D. Saha, A. Chakrabarti, Self aware SoC security to counteract delay inducing hardware trojans at runtime, in 2017 30th International Conference on VLSI Design and 2017 16th International Conference on Embedded Systems (VLSID) (2017), pp. 417–422

    Google Scholar 

  7. K. Guha, S. Saha, A. Chakrabarti, Shirt (self healing intelligent real time) scheduling for secure embedded task processing, in 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID) (2018), pp. 463–464

    Google Scholar 

  8. K. Guha, D. Saha, A. Chakrabarti, Stigmergy-based security for SoC operations from runtime performance degradation of SoC components. ACM Trans. Embed. Comput. Syst. 18(2), 14:1–14:26 (2019)

    Google Scholar 

  9. A. Majumder, D. Saha, A. Chakrabarti, K. Guha, Dynamic power-aware scheduling of real-time tasks for FPGA-based cyber physical systems against power draining hardware trojan attacks. J. Supercomput. 76(11), 8972–9009 (2020)

    Google Scholar 

  10. K. Huang, Y. Liu, N. Korolija, J.M. Carulli, Y. Makris, Recycled IC detection based on statistical methods. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6), 947–960 (2015)

    Article  Google Scholar 

  11. D. Jayasinghe, A. Ignjatovic, S. Parameswaran, NORA: algorithmic balancing without pre-charge to thwart power analysis attacks, in 2017 30th International Conference on VLSI Design and 2017 16th International Conference on Embedded Systems (VLSID) (2017), pp. 167–172

    Google Scholar 

  12. C. Liu, J. Jou, Efficient coverage analysis metric for HDL design validation. IEE Proc. Comput. Digit. Tech. 148(1), 1–6 (2001)

    Article  Google Scholar 

  13. Y. Liu, Y. Jin, Y. Makris, Hardware trojans in wireless cryptographic ICs: silicon demonstration & detection method evaluation, in Proceedings of the International Conference on Computer-Aided Design, ICCAD ’13 (2013), pp. 399–404

    Google Scholar 

  14. C. Liu, J. Rajendran, C. Yang, R. Karri, Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task scheduling. IEEE Trans. Emerg. Top. Comput. 2(4), 461–472 (2014)

    Article  Google Scholar 

  15. S. Mal-Sarkar, R. Karam, S. Narasimhan, A. Ghosh, A. Krishna, S. Bhunia, Design and validation for FPGA trust under hardware trojan attacks. IEEE Trans. Multi-Scale Comput. Syst. 2(3), 186–198 (2016)

    Article  Google Scholar 

  16. S. Narasimhan, D. Du, R.S. Chakraborty, S. Paul, F.G. Wolff, C.A. Papachristou, K. Roy, S. Bhunia, Hardware trojan detection by multiple-parameter side-channel analysis. IEEE Trans. Comput. 62(11), 2183–2195 (2013)

    Article  MathSciNet  Google Scholar 

  17. Luis Ribeiro, Mats Björkman, Transitioning from standard automation solutions to cyber-physical production systems: an assessment of critical conceptual and technical challenges. IEEE Syst. J. 12(4), 3816–3827 (2018)

    Article  Google Scholar 

  18. J.J. Rajendran, O. Sinanoglu, R. Karri, Building trustworthy systems using untrusted components: a high-level synthesis approach. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 24(9), 2946–2959 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Krishnendu Guha .

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Guha, K., Saha, S., Chakrabarti, A. (2021). Bypassing Passive Attacks. In: Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms. Springer, Cham. https://doi.org/10.1007/978-3-030-79701-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-79701-0_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-79700-3

  • Online ISBN: 978-3-030-79701-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics