SVD-Based Ghost Circuitry Detection
نویسندگان
چکیده
Ghost circuitry (GC) insertion is the malicious addition of hardware in the specification and/or implementation of an IC by an attacker intending to change circuit functionality. There are numerous GC insertion sources, including untrusted foundries, synthesis tools and libraries, testing and verification tools, and configuration scripts. Moreover, GC attacks can greatly compromise the security and privacy of hardware users, either directly or through interaction with pertinent systems, application software, or with data. GC detection is a particularly difficult task in modern and pending deep submicron technologies due to intrinsic manufacturing variability. Here, we provide algebraic and statistical approaches for the detection of ghost circuitry. A singular value decomposition (SVD)-based technique for gate characteristic recovery is applied to solve a system of equations created using fast and non-destructive measurements of leakage power and/or delay. This is then combined with statistical constraint manipulation techniques to detect embedded ghost circuitry. The effectiveness of the approach is demonstrated on the ISCAS 85 benchmarks.
منابع مشابه
Research on Color Watermarking Algorithm Based on RDWT-SVD
In this paper, a color image watermarking algorithm based on Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD) is proposed. The new algorithm selects blue component of a color image to carry the watermark information since the Human Visual System (HVS) is least sensitive to it. To increase the robustness especially towards affine attacks, RDWT is adopted for its...
متن کاملReal-time ghost removal for foreground segmentation methods
Among all the challenges for foreground detection, we focus on detection of ghosts caused by the starting or stopping of objects. We propose a fast and effective method for ghost detection that compares the similarity between the edges of the detected foreground objects and those of the current frame based on object-level knowledge of moving objects. Finally we demonstrate the performance of gh...
متن کاملDetection of Copy-move Image forgery using SVD and Cuckoo Search Algorithm
Copy-move forgery is one of the simple and effective operations to create forged images. Recently, techniques based on singular value decomposition (SVD) are widely used to detect copy-move forgery (CMF). Some approaches based on SVD are most acceptable to detect copy-move forgery but some copy-move forgery detection approaches can not produce satisfactory detection results. Sometimes these app...
متن کاملLow-Complexity Signal Vector Based Detection Algorithm for Spatial Modulation
In this paper, signal vector based detection (SVD) algorithm for spatial modulation (SM) is modified to achieve a near maximum-likelihood (ML) performance and reduces the complexity compared to ML. First, the proposed low-complexity SVD (LC-SVD) algorithm orders the antenna index list based on the angle between the received vector y and the channel vector j h , and then it estimates symbol by c...
متن کاملGeneration, characterization, and application in serodiagnosis of recombinant swine vesicular disease virus-like particles
Swine vesicular disease (SVD) is a highly contagious viral disease that causes vesicular disease in pigs. The importance of the disease is due to its indistinguishable clinical signs from those of foot-and-mouth disease, which prevents international trade of swine and related products. SVD-specific antibody detection via an enzyme-linked immunosorbent assay (ELISA) is the most versatile and com...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009