0 votes
121 views

Is there any good IEEE submissions towards detecting hardware malware via fingerprint detection

asked Sep 18, 2015 in Computer Science - IT by slow_learner
edited Nov 2, 2016 by slow_learner | 121 views

1 Answer

0 votes
Selected Ans.

Author Profile (Any one Author ):

  1. Name
    Prof.Sandhu R
  2. Education Background  (Reference Link Required) : 
    PhD in Computer Science, Rutgers University, 1983
    MS in Computer Science, Rutgers University, 1980
    MTech in Computer Technology, IIT Delhi, 1976
    BTech in Electrical Engineering, IIT Bombay, 1974
    Reference Link : http://www.profsandhu.com/
  3. Publications (if any)
    Role-based access control models
    Proposed NIST standard for role-based access control
    Reference Link : https://scholar.google.com/citations?user=wic7YpkAAAAJ
  4. Current Institution / Location of Author
    University of Texas at San Antonio
    Reference Link : http://www.profsandhu.com/

Proposed Paper Profile : IEEE Link

  1. Title : Fingerprint-Based Detection and Diagnosis of Malicious Programs in Hardware
  2. Name of Authors : Liu, B. , Sandhu, R.
  3. Article References (3)
    1. A. T. Abdel-Hamid, S. Tahar and M. Aboulhamid  "A survey on IP watermarking techniques",  Design Autom. Embed. Syst.,  vol. 9,  pp.211 -227 2004 

    2. M. Agrawal, S. Karmakar, D. Saha and D. Mukhopadhyay  "Scan based side channel attacks on stream ciphers and their counter-measures",  Proc. Int. Conf. Cryptology in India (INDOCRYPT),  pp.226 -238 

    3. "Anti-tamper capabilities in FPGA designs",  
  4. Important Keywords (3)
    Cryptography
    Hardware
    Trojan horses
  5. Publisher Name :
    IEEE
  6. Published Year:
    14 May 2015
  7. ISSN / ISBN
    0018-9529

Research Paper:

  1. Highlight importance of proposed article
    fingerprint-based method to detect any malicious program in hardware. Paper Proposes a tamper-evident architecture (TEA) which samples runtime signals in a hardware system during the performance of a computation, and generates a cryptographic hash-based fingerprint that uniquely identifies a sequence of sampled signals. A hardware Trojan cannot tamper with any sampled signal without leaving tamper evidence such as a missing or incorrect fingerprint. We further verify fingerprints off-chip such that a hardware Trojan cannot tamper with the verification process.
  2. Explain any one keyword used in article
    Trojan Horse:
    In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk.
answered Sep 18, 2015 by slow_learner
edited Sep 18, 2015 by slow_learner