SlideShare a Scribd company logo
1 of 20
Embedded Security as a new phenomenon in the field of securing different system
and Identifying and preventing hardware Trojan.

CS/ECE 561
RAKESH VISHWANATH
Overview


Introduction



Embedded Security Requirement



Embedded Security in different System



Identifying and detecting Hardware Trojans



Isolation of Hardware Trojans



Conclusion
Introduction to Embedded Security


In today’s world Embedded Security is one or the other form most important requirement for
increasing number of embedded system.



As future technologies which promise greater interaction between computer and humans
are increasing there security becomes paramount issue which needs to be taken care.



Embedded Security is one form which makes successful deployment of next generation
Embedded System.



Embedded security can’t be solved at a single security abstraction layer, but rather it needs a
more multiple abstraction layer security for systems.
Embedded Security Requirement


Embedded System often provide critical functions
that could be attack by malicious entities.



Embedded system security often requires
protecting critical or sensitive information (code or
data) throughout its lifetime.



Security should be such a way that it should
possess data confidentiality, data integrity and peer
authentication.



Security requirement may vary when considered
from the view point of manufacture ex: cellphone.
Embedded Security in different systems


Classical and Quantum Cryptography – In Optical Burst Switching.



Traditional by which two separate cores providing security through
isolation and ARM trust Zone technology – In Dual Virtual CPU System.



Classical server based finger print verification and User based scheme where
user authenticates directly from Embedded device - In Bio-metric authentication
Security.
Embedded Security in Optical Burst Switching [OBS]


Optical Burst Switching [OBS] is one of the most
promising optical switching technology for future
internet which provides finer granularity but suffers
from security vulnerabilities.



Even though OBS provide IPsec to secure IP network
but its security limit is for traffic that do not
necessary have IP layer.



Best to provide Embedded security framework which
combines both classical and quantum cryptography.
Embedded Security in Dual Virtual CPU System


In Dual Virtual CPU System security is the main concern which needs to be solved.



Security in Dual Virtual CPU can be maintained by two ways.
- Traditional by which two separate cores providing security through isolation.
- ARM trust Zone technology.
Embedded Security in Dual Virtual CPU System- Continued


The figure shows traditional way of achieving
Embedded Security in Dual Virtual CPU.



In this method there is one SoC package with two
separate system.



First CPU runs the normal world operating system
its memory and peripherals consume lot of space.



Second CPU runs Security sensitive codes and its
complete system is inside SoC.
Embedded Security in Dual Virtual CPU System- Continued


The figure shows ARM trust Zone of achieving Embedded
Security in Dual Virtual CPU.



In this method the processor is viewed as two separate
virtual processor while running software.



And in this method switching between trust Zone secure
and normal world is initiated only by extension.



Design using trust Zone approach have the advantage of
dual core CPU approach.
Embedded Security as Biometric authentication


Biometric authentication is one form of security which facilitates both user and server
from malicious attack.



Security in Biometric can be achieved in two ways
- Classical server based finger print verification.

- User based scheme where user authenticates directly from Embedded device.
Embedded Security as Biometric authentication-Continued


The figure shows the Classical Server based finger
print verification in Biometric authentication.



In this method the user enters his identity into
server ex: magnetic card.



This form of Security scheme posses some security
flaws.
Embedded Security as Biometric authentication-Continued


The figure shows the device based scheme where
user authenticates directly from embedded device.



In this method device fingerprint sensor and
template are located, avoiding server based
security issues.



And in this method the device initiates a verification
transaction by transmitting its ID to the server.
Identifying Hardware Trojan


In recent years the threat to the security of
Integrated Circuits (IC’s) are Hardware Trojan
Horse.



The figure shows the simple Trojan during normal
operation.



Trojan can be identified by many ways like
- Gate level Characterization.
- Path delay finger print.
- power supply transient signals.
- Current integration method.
Identifying Hardware Trojan – Gate level Characterization


The main technical obstacles to Hardware Trojan Horse detection is due to
manufacturing variability.



In this method they first recover the characteristics of gate like recovering
the properties of ICs.



In this method they make use of linear programming to solve the equations
of system created by non destructive measurements of power and delay.
Identifying Hardware Trojan – Path delay finger print


In this method Trojans are characterized and the cost of testing is lowered.



In this method the chips are validated by comparing there delay parameter to the
finger prints.



In path delay finger print the whole testing procedure is followed by three methods.

- path delay gathering of nominal chip.
- Finger print generation.
- Trojan Detection.
Identifying Hardware Trojan – Power supply transient signals


In this method the Trojans are detected based on the
analysis of power transient signal and statistical
prediction eclipse technique.



In this method process variation takes place due to
power transient signal measured at each port so they
use calibration test.



In calibration test the configure the scan chain to deliver
a step input to the gate of p-channel transistor figure
shows the calibration circuit response.
Identifying Hardware Trojan – Current Integration method


In this method the chip is connected by four ports
and they are identified by exhaustive test as shown
in the figure.



In this process the worst case charger will be
obtained in response to pattern set and the pattern
set will be applied to each chip .



In this method the small current difference between
the Trojan inserted and Trojan free circuit can be
magnified by the charger integration process.
Isolation of Hardware Trojan


The Isolation of Trojan is done at the final stage after detection of hardware Trojan.



The Trojan Isolation process has made the fact that will draw more current from
their nearest power port.



In this method the current at each power is measured, integrated and compared
with the current integration process of each port.
Conclusion


As Embedded System are increasing day by day security is the serious threat,
Embedded security if one form of security which protects from malicious attack.



Embedded Security handles the information in trusted and isolated environment
preventing from the malicious attack of device.



This Survey made an effort to explain Embedded security and their security in
different system along with Identifying and Preventing Hardware Trojans.
Reference
[1] Introduction :
a). David D, Hwand “Securing Embedded system” IEEE Security & Privacy April 2006.
b). Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi “Security as a new dimension in the field of
Embeddded security” published in Citeseer 2004.
[2] Embedded Security Requirement :
Mehran Mozaffari Kermani, Meng Zhang, Anand Raghunathan, Niraj K. Jha “ Emerging Frontiers in Embedded security”. VLSI
design and 2013 12th International conference on embedded system, IEEE 2013.

[3] Embedded Security in different System:
a). Yuhua Chen, Pramode k. Verma and Subhash kak “ Embedded security framework for Integrated Classical and Quantum
Cryptography Service in Optical Burst Switching Network” published on 17th Feb 2009 Wiley Interscience.
b). Wilson.P, Frey.A, Mihm.T,Kershaw D.” Implementing embedded security on Dual Virtual CPU System” Published in Design
& Test computer, IEEE Nov-Dec 2007.
[4] Identifying and detecting Hardware Trojans:
Miodrag Potkonjak, Nahapetian, Nelson, Massey” Hardware Trojan Detection using gate level characterization” Published in
Design automation conference 2009 DAC ’09 46th ACM/IEEE.
[5] Isolation of Hardware Trojans:
Xiaoxiao Wang, Hassan Salmani and Mohammad Tehranipoo,Jim Plusquellic “Hardware Trojan Detection and Isolation Using
Current Integration and Localized Current Analysis IEEE 2008.

More Related Content

What's hot

What's hot (19)

35 38
35 3835 38
35 38
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System Security
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Secure Embedded Systems
Secure Embedded SystemsSecure Embedded Systems
Secure Embedded Systems
 
Firewalls
FirewallsFirewalls
Firewalls
 
Security in embedded systems
Security in embedded systemsSecurity in embedded systems
Security in embedded systems
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
 
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor network
 
574 501-507
574 501-507574 501-507
574 501-507
 
50120140507012
5012014050701250120140507012
50120140507012
 
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
 
Bp24447451
Bp24447451Bp24447451
Bp24447451
 

Similar to Vishwanath rakesh ece 561

Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
Eng. Mohammed Ahmed Siddiqui
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
Ushnish Chowdhury
 
Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...
eSAT Publishing House
 

Similar to Vishwanath rakesh ece 561 (20)

Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
A05510105
A05510105A05510105
A05510105
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Network security
Network security Network security
Network security
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Test versus security @ IEEE Concept
Test versus security @ IEEE ConceptTest versus security @ IEEE Concept
Test versus security @ IEEE Concept
 
IJCSE Paper
IJCSE PaperIJCSE Paper
IJCSE Paper
 
Day4
Day4Day4
Day4
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
 
W04404135146
W04404135146W04404135146
W04404135146
 
Cyber security
Cyber securityCyber security
Cyber security
 
IoT summit - Building flexible & secure IoT solutions
IoT summit - Building flexible & secure IoT solutionsIoT summit - Building flexible & secure IoT solutions
IoT summit - Building flexible & secure IoT solutions
 
Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...
 
Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Vishwanath rakesh ece 561

  • 1. Embedded Security as a new phenomenon in the field of securing different system and Identifying and preventing hardware Trojan. CS/ECE 561 RAKESH VISHWANATH
  • 2. Overview  Introduction  Embedded Security Requirement  Embedded Security in different System  Identifying and detecting Hardware Trojans  Isolation of Hardware Trojans  Conclusion
  • 3. Introduction to Embedded Security  In today’s world Embedded Security is one or the other form most important requirement for increasing number of embedded system.  As future technologies which promise greater interaction between computer and humans are increasing there security becomes paramount issue which needs to be taken care.  Embedded Security is one form which makes successful deployment of next generation Embedded System.  Embedded security can’t be solved at a single security abstraction layer, but rather it needs a more multiple abstraction layer security for systems.
  • 4. Embedded Security Requirement  Embedded System often provide critical functions that could be attack by malicious entities.  Embedded system security often requires protecting critical or sensitive information (code or data) throughout its lifetime.  Security should be such a way that it should possess data confidentiality, data integrity and peer authentication.  Security requirement may vary when considered from the view point of manufacture ex: cellphone.
  • 5. Embedded Security in different systems  Classical and Quantum Cryptography – In Optical Burst Switching.  Traditional by which two separate cores providing security through isolation and ARM trust Zone technology – In Dual Virtual CPU System.  Classical server based finger print verification and User based scheme where user authenticates directly from Embedded device - In Bio-metric authentication Security.
  • 6. Embedded Security in Optical Burst Switching [OBS]  Optical Burst Switching [OBS] is one of the most promising optical switching technology for future internet which provides finer granularity but suffers from security vulnerabilities.  Even though OBS provide IPsec to secure IP network but its security limit is for traffic that do not necessary have IP layer.  Best to provide Embedded security framework which combines both classical and quantum cryptography.
  • 7. Embedded Security in Dual Virtual CPU System  In Dual Virtual CPU System security is the main concern which needs to be solved.  Security in Dual Virtual CPU can be maintained by two ways. - Traditional by which two separate cores providing security through isolation. - ARM trust Zone technology.
  • 8. Embedded Security in Dual Virtual CPU System- Continued  The figure shows traditional way of achieving Embedded Security in Dual Virtual CPU.  In this method there is one SoC package with two separate system.  First CPU runs the normal world operating system its memory and peripherals consume lot of space.  Second CPU runs Security sensitive codes and its complete system is inside SoC.
  • 9. Embedded Security in Dual Virtual CPU System- Continued  The figure shows ARM trust Zone of achieving Embedded Security in Dual Virtual CPU.  In this method the processor is viewed as two separate virtual processor while running software.  And in this method switching between trust Zone secure and normal world is initiated only by extension.  Design using trust Zone approach have the advantage of dual core CPU approach.
  • 10. Embedded Security as Biometric authentication  Biometric authentication is one form of security which facilitates both user and server from malicious attack.  Security in Biometric can be achieved in two ways - Classical server based finger print verification. - User based scheme where user authenticates directly from Embedded device.
  • 11. Embedded Security as Biometric authentication-Continued  The figure shows the Classical Server based finger print verification in Biometric authentication.  In this method the user enters his identity into server ex: magnetic card.  This form of Security scheme posses some security flaws.
  • 12. Embedded Security as Biometric authentication-Continued  The figure shows the device based scheme where user authenticates directly from embedded device.  In this method device fingerprint sensor and template are located, avoiding server based security issues.  And in this method the device initiates a verification transaction by transmitting its ID to the server.
  • 13. Identifying Hardware Trojan  In recent years the threat to the security of Integrated Circuits (IC’s) are Hardware Trojan Horse.  The figure shows the simple Trojan during normal operation.  Trojan can be identified by many ways like - Gate level Characterization. - Path delay finger print. - power supply transient signals. - Current integration method.
  • 14. Identifying Hardware Trojan – Gate level Characterization  The main technical obstacles to Hardware Trojan Horse detection is due to manufacturing variability.  In this method they first recover the characteristics of gate like recovering the properties of ICs.  In this method they make use of linear programming to solve the equations of system created by non destructive measurements of power and delay.
  • 15. Identifying Hardware Trojan – Path delay finger print  In this method Trojans are characterized and the cost of testing is lowered.  In this method the chips are validated by comparing there delay parameter to the finger prints.  In path delay finger print the whole testing procedure is followed by three methods. - path delay gathering of nominal chip. - Finger print generation. - Trojan Detection.
  • 16. Identifying Hardware Trojan – Power supply transient signals  In this method the Trojans are detected based on the analysis of power transient signal and statistical prediction eclipse technique.  In this method process variation takes place due to power transient signal measured at each port so they use calibration test.  In calibration test the configure the scan chain to deliver a step input to the gate of p-channel transistor figure shows the calibration circuit response.
  • 17. Identifying Hardware Trojan – Current Integration method  In this method the chip is connected by four ports and they are identified by exhaustive test as shown in the figure.  In this process the worst case charger will be obtained in response to pattern set and the pattern set will be applied to each chip .  In this method the small current difference between the Trojan inserted and Trojan free circuit can be magnified by the charger integration process.
  • 18. Isolation of Hardware Trojan  The Isolation of Trojan is done at the final stage after detection of hardware Trojan.  The Trojan Isolation process has made the fact that will draw more current from their nearest power port.  In this method the current at each power is measured, integrated and compared with the current integration process of each port.
  • 19. Conclusion  As Embedded System are increasing day by day security is the serious threat, Embedded security if one form of security which protects from malicious attack.  Embedded Security handles the information in trusted and isolated environment preventing from the malicious attack of device.  This Survey made an effort to explain Embedded security and their security in different system along with Identifying and Preventing Hardware Trojans.
  • 20. Reference [1] Introduction : a). David D, Hwand “Securing Embedded system” IEEE Security & Privacy April 2006. b). Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi “Security as a new dimension in the field of Embeddded security” published in Citeseer 2004. [2] Embedded Security Requirement : Mehran Mozaffari Kermani, Meng Zhang, Anand Raghunathan, Niraj K. Jha “ Emerging Frontiers in Embedded security”. VLSI design and 2013 12th International conference on embedded system, IEEE 2013. [3] Embedded Security in different System: a). Yuhua Chen, Pramode k. Verma and Subhash kak “ Embedded security framework for Integrated Classical and Quantum Cryptography Service in Optical Burst Switching Network” published on 17th Feb 2009 Wiley Interscience. b). Wilson.P, Frey.A, Mihm.T,Kershaw D.” Implementing embedded security on Dual Virtual CPU System” Published in Design & Test computer, IEEE Nov-Dec 2007. [4] Identifying and detecting Hardware Trojans: Miodrag Potkonjak, Nahapetian, Nelson, Massey” Hardware Trojan Detection using gate level characterization” Published in Design automation conference 2009 DAC ’09 46th ACM/IEEE. [5] Isolation of Hardware Trojans: Xiaoxiao Wang, Hassan Salmani and Mohammad Tehranipoo,Jim Plusquellic “Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis IEEE 2008.