SlideShare a Scribd company logo
NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
Combating Data Leakage Trojans in Commercial and ASIC Applications
With Time-Division Multiplexing and Random Encoding
Abstract:
Globalization of microchip fabrication opens the possibility for an attacker to insert
hardware Trojans into a chip during the manufacturing process. While most defensive
methods focus on detection or prevention, a recent method, called Randomized Encoding
of Combinational Logic for Resistance to Data Leakage (RECORD), uses data
randomization to prevent hardware Trojans from leaking meaningful information even
when the entire design is known to the attacker. Both RECORD and its sequential variant
require significant area and power overhead. In this paper, a Time-Division Multiplexed
version of the RECORD design process is proposed which reduces area overhead by 63%
and power by 56%. This time-division multiplexing (TDM) concept is further refined to
allow commercial off the shelf (COTS) products and IP cores to be safely operated from
a separate chip. These new methods tradeoff latency (5.3× for TDM and 3.9× for COTS)
and energy use to accomplish area and power savings and achieve greater security than
the original RECORD process.
Software Implementation:
 Modelsim
 Xilinx 14.2
Existing System:
Detection and prevention of hardware Trojan attacks has become a major concern for a
company wishing to outsource its hardware manufacturing. The threat of a hardware
Trojan could lie dormant on a new chip for years before crippling it. Hardware Trojans
could also steal encryption keys, passwords, or other sensitive information,
NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
compromising security-critical systems. These data leakage Trojans can leak secret
information out through Wi-Fi or even through the power signature itself. Detecting
hardware Trojans has proven very difficult if not impossible. Some Trojans have been
demonstrated to successfully operate with as little as five transistors.
Most current methods of defense would be ineffective against such an attack. This
problem extends beyond custom application specified integrated circuit (ASIC) designs
and the firms creating them. Most companies buy commercial chips and are in no way
involved in the design and production processes. Protecting against Trojan‘s in a
commercial off-the-shelf (COTS) chip has so far been a mostly unexplored area of
hardware Trojan defense. Current methods of detecting hardware Trojans after
production involve runtime monitoring and post manufacture testing. Runtime
monitoring and post manufacture testing rely on identifying the differences in chip
operation introduced by the Trojan circuit. These methods depend on the tester‘s ability
to trigger the Trojan circuit so the effects of the Trojan can be measured. For runtime
monitoring and post manufacture testing to work, a ―golden chip‖ is usually needed for
comparison, as simulation of the chip functionality is generally not accurate enough to
show the very small changes introduced by the additional Trojan circuitry. How to
produce the golden chip is a major problem. Furthermore, neither of these broad
categories of Trojan protection is relevant for a third party company buying a COTS chip.
A more reliable method of protection is to design the chip for security from the
beginning. The concept of design for security (DFS) encompasses many possible ideas
and methods, such as obfuscation layout camouflaging and split manufacturing.
Obfuscation and layout camouflaging, however, are both susceptible to reverse
engineering given enough time and effort. Split manufacturing is susceptible if multiple
fabrication runs are used, which is often the case in modern design flows.
This paper focuses on a new DFS method known as Randomized Encoding of
Combinational Logic for Resistance to Data Leakage (RECORD) and more specifically
NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
the sequential RECORD variant which can protect sensitive information from being
leaked even when the full design is known to the attacker and multiple fabrication runs
are needed. Sequential RECORD took the initial concept of RECORD, which was only
specified for combinational logic, and extended it to sequential circuits. The method uses
two randomly generated numbers to temporarily encode incoming data into a dual-rail
signal. The random numbers represent one of the rails. Through Boolean manipulation
and split manufacturing, the sequential RECORD process is able to effectively prevent
any data leakage Trojans from capturing meaningful data from anywhere on the chip.
This process does not try to detect or even prevent hardware Trojans on the chip. There is
no longer any need. Any data captured by the attacks would be meaningless. The
sequential RECORD process suffers from two drawbacks. First, the RECORD algorithm
increases the area by almost 4× and the power by about 4.5×. And since it is a DFS
method, it must be designed into the chip from the start making it useless for COTS
applications. In this paper two modifications to the RECORD process are presented.
The first, time-division multiplexing (TDM) RECORD, will show how the RECORD
process can be modified to reduce the area and power overhead by 63% and 56%,
respectively, at the expense of processing time and total energy used. Second, a scheme
to use the RECORD concepts off chip to allow safe operation of COTS products is
presented.
Disadvantages:
 Overhead is not reduced
 Security is lower
 Area and power savings is lower
Proposed System:
Time-division multiplexing
NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
RECORD provides excellent protection for custom ASIC designs both for combinational
or sequential circuits. It does, however, carry a large area and power overhead,
approximately 3.75× area and 4.5× power for sequential RECORD. RECORD also
benefits from using a simple and generic implementation that can be easily adapted to
any design with no circuit specific logic or control. When area or power is at a premium a
different approach is needed. TDM offers a perfect solution to reduce the power and area
overhead. The sequential RECORD process contains four copies of the same logic. This
serves two purposes; it allows for quick parallel processing of the four input vectors and
helps to confuse attackers. TDM RECORD eliminates the duplication while at the same
time opening up possibilities for an even more secure protection scheme.
The intermediate combinational logic is copied four times and operated on in parallel.
The only difference between the blocks is that each block of logic is sent a different input
vector. In TDM RECORD, the four variant input combinations can be sent in sequence to
just one copy of the intermediate logic instead of four. The outputs of the intermediate
logic are then stored in one of the four register blocks before being demuxed to determine
the final correct output. The register blocks are not the same as in sequential RECORD.
In TDM RECORD, all four outputs are not available in the same clock cycle. Each
intermediate output vector, g1–4, is stored on subsequent clock cycles until all four input
vectors have completed.
NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
Fig. 1. Registers for each round of TDM RECORD and the reindexing logic
The four stored outputs are then demuxed with the two random bits as select signals, as
before. The new output is reindexed against two newly generated random bits before
being sent on to the next set of intermediate logic, as shown in Fig. 1. The random bits
must be stored for four clocks cycles and used to generate g1–4 instead of changing on
each cycle. This restriction means that control logic is needed to orchestrate when new
random bits are needed and into which register block the intermediate outputs, g1–4, are
placed. The entire process is illustrated in Fig. 2. At clock cycle T , the incoming data
vector is converted to the dual-rail representation with r1 and r2. The new input bits, t,
are then sent to the first logic block. The output is then stored in register block 1. At clock
cycle, T + 1, the same input bits, t, are sent back to the same logic block but with some of
the inputs inverted. The outputs are stored in register
NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
Fig. 2. Conceptual dataflow diagram for TDM RECORD process showing the first round of data
processing.
NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
Fig. 3. COTS RECORD dataflow between the two chips.
block 2. This process is repeated two more times with the bits of t being inverted or not
inverted. Finally at clock cycle T +4, the register blocks are demuxed using r1 and r2 as
select signals. Here, r1 and r2 have not been allowed to change from cycle to cycle but
have been stored since cycle T . At clock cycle T + 5 the random bits are allowed to
change, the output of the register block is updated, and the process begins again. T
he security of the random bits is maintained with split manufacturing. The upper tier
would contain the control logic, the input multiplexers, registers with XOR gates, output
registers, and final demux. The bottom tier contains all of the intermediate logic. Storing
the random bits for four clock cycles does nothing to compromise the security. An
attacker would still need to wait until all four input data vectors have processed before
attempting to infer the random bit, at which time the bit would change just as in
sequential RECORD. TDM RECORD gives some obfuscation options that were not
NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
available with RECORD or sequential RECORD. First, sequential RECORD was
resistant to attackers inferring the random bits by reading the signals moving between
upper and lower tiers.
However, remote possibilities still existed of inferring the encoded data if the attacker
knew which combinational block was receiving which input vector, which input bits were
indexed against which random bits, and finally knew the indexing of the returning
register outputs. Fig. 2. shows Conceptual dataflow diagram for TDM RECORD process
showing the first round of data processing. By making use of the random number
generator/s (RNG) in TDM RECORD, the control logic can randomly change the order in
which the input vectors are presented to the logic. For example, the first iteration could
present the input vectors in normal order (1, 2, 3, and 4) but the next iteration could
present them in the order (2, 3, 1, and 4) and so on.
Second, to further frustrate attackers, the number of random bits can be increased.
Adding a third random bit was previously infeasible due to the excessive area and power
overhead. Now that third random bit would increase the number of input vector variations
by up to eight but at a very small cost to additional area and power. Only four additional
register blocks and alterations to the control logic are needed while at the
COTS application
RECORD in all its variations provides excellent protection against hardware Trojan
attacks. However, they are applicable only to custom ASIC chips. Quilt Packaging and 3-
D manufacturing are not cheap. The cost of manufacturing a RECORD or sequential
RECORD design would be many times the cost of a standard chip. While acceptable in
certain cases, these packaging options may be cost prohibitive in others. Many
NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
applications, especially military ones, are moving to COTS chips to meet specifications
and budget. These chips are even more susceptible to hardware Trojan injection since
there may not be any hardware security plan in mind when they are designed.
A recent paper has identified commercial parts as the number one area needing research
and a solution for preventing hardware Trojans attacks. The TDM RECORD process
presents an excellent opportunity to prevent data leakage when using COTS ICs. TDM
RECORD can be extended to a COTS chip by moving the TDM RECORD control logic
to a separate chip, such as an FPGA. The registers on the COTS chip cannot be moved
nor can they be individually accessed in most cases. Consequently, the TDM process of
injecting the appropriate data vectors into each intermediate logic block is no longer
applicable. The second chip of the COTS RECORD process must now send each of the
four input data vectors to the COTS chip and wait for the chip to fully complete its
operation. The process is shown in Fig. 3. In the case of a Data Encryption Standard
(DES) chip, this process would take 16 cycles to produce a final encoded output. That
output would then be stored in the control chip and the next of four input vectors would
be sent. While the four input vectors are being operated upon, only one set of random bits
is used and stored on the control chip. There is no need to send them to the COTS chip,
so they are safe from detection. When all four vectors have been processed, the control
chip will demux the results using the random bits as select signals and convert them back
to single rail before sending the final output to its original destination.
Advantages:
 Overhead is reduced
 Security is higher
 Area and power savings is higher
References:
NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
[1] Y. Jin and Y. Makris, ―Hardware trojans in wireless cryptographic ICs,‖ IEEE Design Test Comput.,
vol. 27, no. 1, pp. 26–35, Jan./Feb. 2010.
[2] L. Lin, M. Kasper, T. Güneysu, C. Paar, and W. Burleson, ―Trojan side-channels: Lightweight
hardware trojans through side-channel engineering,‖ in Cryptographic Hardware and Embedded
Systems—CHES (Lecture Notes in Computer Science), vol. 5747. Berlin, Germany: Springer, 2009, pp.
382–395.
[3] K. Yang, M. Hicks, Q. Dong, T. Austin, and D. Sylvester, ―A2: Malicious hardware,‖ in Proc. IEEE
Symp. Secur. Privacy, San Jose, CA, USA, May 2016, pp. 18–37.
[4] C. A. Kamhoua, M. Rodriguez, and K. A. Kwiat, ―Testing for hardware trojans: A game-theoretic
approach,‖ in Decision and Game Theory for Security,‖ (Lecture Notes in Computer Science), vol.
8840. Cham, Switzerland: Springer, 2014, pp. 360–369. [
[5] M. Rostami, F. Koushanfar, and R. Karri, ―A primer on hardware security: Models, methods, and
metrics,‖ Proc. IEEE, vol. 102, no. 8, pp. 1283–1295, Aug. 2014.
[6] R. S. Chakraborty and S. Bhunia, ―Security against hardware trojan through a novel application of
design obfuscation,‖ in Proc. Int. Conf. Comput.-Aided Design (ICCAD), New York, NY, USA, Nov.
2009, pp. 113–116.
[7] J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, ―Security analysis of integrated circuit
camouflaging,‖ in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2013, pp. 709–720.
[8] J. Rajendran, O. Sinanoglu, and R. Karri, ―Is split manufacturing secure?‖ in Proc. Conf. Design,
Autom. Test Europe, DATE, vol. 13, 2013, pp. 1259–1264.
[9] R. Dura, S. Hidalgo, R. Quijada, A. Raventos, and T. Francesc, ―The use of digital image processing
for IC reverse engineering,‖ in Proc. 11th Int. Multi-Conf. Syst., Signals Devices (SSD), Feb. 2014, pp.
1–4.
[10] D. E. Dilger. (Jan. 14, 2016). Apple A9 Chip fab TSMC Reports Record Earnings, Casting Further
Doubt on ‗Peak iPhone‘. [Online]. Available: http://appleinsider.com/articles/16/01/14/apple-a9- chip-
fab-tsmc-reports-record-earnings-casts-doubt-on-peak-iphone
NXFEE INNOVATION
(SEMICONDUCTOR IP &PRODUCT DEVELOPMENT)
(ISO : 9001:2015Certified Company),
# 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam,
Pondicherry– 605004, India.
Buy Project on Online :www.nxfee.com | contact : +91 9789443203 |
email : nxfee.innovation@gmail.com
_________________________________________________________________
[11] T. E. Schulze, Y. Shi, C. Kamhoua, K. Kwiat, and S. Chang, ―RECORD: Temporarily randomized
encoding of combinational logic for resistance to data leakage from hardware trojan,‖ in Proc. Asian
HOST, Yilan, Taiwan, Dec. 2016, pp. 1–6.
[12] T. E. Schulze, K. Kwiat, C. Kamhoua, D. Beetner, L. Njilla, and Y. Shi, ―Combating data leakage
trojans in sequential circuits through randomized encoding,‖ in Proc. IEEE Dependable, Autonomic
Secure Comput. (DASC), Orlando, FL, USA, Nov. 2017, pp. 639–644.
[13] J. T. McDonald, Y. Kim, and D. Koranek, ―Deterministic circuit variation for anti-tamper
applications,‖ in Proc. 7th Annu. Workshop Cyber Secur. Inf. Intell. Res., 2011, Art. no. 68.

More Related Content

Similar to Combating data leakage trojans in commercial and asic applications with time division multiplexing and random encoding

Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
ananthakrishnansblit
 
A high accuracy programmable pulse generator with a 10-ps timing resolution
A high accuracy programmable pulse generator with a 10-ps timing resolutionA high accuracy programmable pulse generator with a 10-ps timing resolution
A high accuracy programmable pulse generator with a 10-ps timing resolution
Nxfee Innovation
 
Sample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginSample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for login
naveendurga557
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
LeMeniz Infotech
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
DNS Data Exfiltration Detection
DNS Data Exfiltration DetectionDNS Data Exfiltration Detection
DNS Data Exfiltration Detection
IRJET Journal
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
 
A reconfigurable ldpc decoder optimized applications
A reconfigurable ldpc decoder optimized applicationsA reconfigurable ldpc decoder optimized applications
A reconfigurable ldpc decoder optimized applications
Nxfee Innovation
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
amallblitz0
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
ananthakrishnansblit
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
 
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.
IRJET Journal
 
Approximate hybrid high radix encoding for energy efficient inexact multipliers
Approximate hybrid high radix encoding for energy efficient inexact multipliersApproximate hybrid high radix encoding for energy efficient inexact multipliers
Approximate hybrid high radix encoding for energy efficient inexact multipliers
Nxfee Innovation
 
Ca co an efficient cauchy coding approach for cloud storage systems
Ca co an efficient cauchy coding approach for cloud storage systemsCa co an efficient cauchy coding approach for cloud storage systems
Ca co an efficient cauchy coding approach for cloud storage systems
LeMeniz Infotech
 
Vector processing aware advanced clock-gating techniques for low-power fused ...
Vector processing aware advanced clock-gating techniques for low-power fused ...Vector processing aware advanced clock-gating techniques for low-power fused ...
Vector processing aware advanced clock-gating techniques for low-power fused ...
Nxfee Innovation
 
Technology radar-may-2013
Technology radar-may-2013Technology radar-may-2013
Technology radar-may-2013Carol Bruno
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
 

Similar to Combating data leakage trojans in commercial and asic applications with time division multiplexing and random encoding (20)

Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
 
A high accuracy programmable pulse generator with a 10-ps timing resolution
A high accuracy programmable pulse generator with a 10-ps timing resolutionA high accuracy programmable pulse generator with a 10-ps timing resolution
A high accuracy programmable pulse generator with a 10-ps timing resolution
 
Sample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginSample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for login
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
DNS Data Exfiltration Detection
DNS Data Exfiltration DetectionDNS Data Exfiltration Detection
DNS Data Exfiltration Detection
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
 
A reconfigurable ldpc decoder optimized applications
A reconfigurable ldpc decoder optimized applicationsA reconfigurable ldpc decoder optimized applications
A reconfigurable ldpc decoder optimized applications
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.
 
Approximate hybrid high radix encoding for energy efficient inexact multipliers
Approximate hybrid high radix encoding for energy efficient inexact multipliersApproximate hybrid high radix encoding for energy efficient inexact multipliers
Approximate hybrid high radix encoding for energy efficient inexact multipliers
 
Ca co an efficient cauchy coding approach for cloud storage systems
Ca co an efficient cauchy coding approach for cloud storage systemsCa co an efficient cauchy coding approach for cloud storage systems
Ca co an efficient cauchy coding approach for cloud storage systems
 
Vector processing aware advanced clock-gating techniques for low-power fused ...
Vector processing aware advanced clock-gating techniques for low-power fused ...Vector processing aware advanced clock-gating techniques for low-power fused ...
Vector processing aware advanced clock-gating techniques for low-power fused ...
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Technology radar-may-2013
Technology radar-may-2013Technology radar-may-2013
Technology radar-may-2013
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 

More from Nxfee Innovation

VLSI IEEE Transaction 2018 - IEEE Transaction
VLSI IEEE Transaction 2018 - IEEE Transaction VLSI IEEE Transaction 2018 - IEEE Transaction
VLSI IEEE Transaction 2018 - IEEE Transaction
Nxfee Innovation
 
Noise insensitive pll using a gate-voltage-boosted source-follower regulator ...
Noise insensitive pll using a gate-voltage-boosted source-follower regulator ...Noise insensitive pll using a gate-voltage-boosted source-follower regulator ...
Noise insensitive pll using a gate-voltage-boosted source-follower regulator ...
Nxfee Innovation
 
An efficient fault tolerance design for integer parallel matrix vector
An efficient fault tolerance design for integer parallel matrix vectorAn efficient fault tolerance design for integer parallel matrix vector
An efficient fault tolerance design for integer parallel matrix vector
Nxfee Innovation
 
The implementation of the improved omp for aic reconstruction based on parall...
The implementation of the improved omp for aic reconstruction based on parall...The implementation of the improved omp for aic reconstruction based on parall...
The implementation of the improved omp for aic reconstruction based on parall...
Nxfee Innovation
 
Multilevel half rate phase detector for clock and data recovery circuits
Multilevel half rate phase detector for clock and data recovery circuitsMultilevel half rate phase detector for clock and data recovery circuits
Multilevel half rate phase detector for clock and data recovery circuits
Nxfee Innovation
 
Low complexity methodology for complex square-root computation
Low complexity methodology for complex square-root computationLow complexity methodology for complex square-root computation
Low complexity methodology for complex square-root computation
Nxfee Innovation
 
Fast neural network training on fpga using quasi newton optimization method
Fast neural network training on fpga using quasi newton optimization methodFast neural network training on fpga using quasi newton optimization method
Fast neural network training on fpga using quasi newton optimization method
Nxfee Innovation
 
Efficient fpga mapping of pipeline sdf fft cores
Efficient fpga mapping of pipeline sdf fft coresEfficient fpga mapping of pipeline sdf fft cores
Efficient fpga mapping of pipeline sdf fft cores
Nxfee Innovation
 
Approximate sum of-products designs based on distributed arithmetic
Approximate sum of-products designs based on distributed arithmeticApproximate sum of-products designs based on distributed arithmetic
Approximate sum of-products designs based on distributed arithmetic
Nxfee Innovation
 
An energy efficient programmable many core accelerator for personalized biome...
An energy efficient programmable many core accelerator for personalized biome...An energy efficient programmable many core accelerator for personalized biome...
An energy efficient programmable many core accelerator for personalized biome...
Nxfee Innovation
 
Algorithm and vlsi architecture design of proportionate type lms adaptive fil...
Algorithm and vlsi architecture design of proportionate type lms adaptive fil...Algorithm and vlsi architecture design of proportionate type lms adaptive fil...
Algorithm and vlsi architecture design of proportionate type lms adaptive fil...
Nxfee Innovation
 
A flexible wildcard pattern matching accelerator via simultaneous discrete fi...
A flexible wildcard pattern matching accelerator via simultaneous discrete fi...A flexible wildcard pattern matching accelerator via simultaneous discrete fi...
A flexible wildcard pattern matching accelerator via simultaneous discrete fi...
Nxfee Innovation
 
A fast and low complexity operator for the computation of the arctangent of a...
A fast and low complexity operator for the computation of the arctangent of a...A fast and low complexity operator for the computation of the arctangent of a...
A fast and low complexity operator for the computation of the arctangent of a...
Nxfee Innovation
 
A closed form expression for minimum operating voltage of cmos d flip-flop
A closed form expression for minimum operating voltage of cmos d flip-flopA closed form expression for minimum operating voltage of cmos d flip-flop
A closed form expression for minimum operating voltage of cmos d flip-flop
Nxfee Innovation
 
A 128 tap highly tunable cmos if finite impulse response filter for pulsed ra...
A 128 tap highly tunable cmos if finite impulse response filter for pulsed ra...A 128 tap highly tunable cmos if finite impulse response filter for pulsed ra...
A 128 tap highly tunable cmos if finite impulse response filter for pulsed ra...
Nxfee Innovation
 
A 12 bit 40-ms s sar adc with a fast-binary-window dac switching scheme
A 12 bit 40-ms s sar adc with a fast-binary-window dac switching schemeA 12 bit 40-ms s sar adc with a fast-binary-window dac switching scheme
A 12 bit 40-ms s sar adc with a fast-binary-window dac switching scheme
Nxfee Innovation
 
Nxfee Innovation Brochure
Nxfee Innovation BrochureNxfee Innovation Brochure
Nxfee Innovation Brochure
Nxfee Innovation
 

More from Nxfee Innovation (17)

VLSI IEEE Transaction 2018 - IEEE Transaction
VLSI IEEE Transaction 2018 - IEEE Transaction VLSI IEEE Transaction 2018 - IEEE Transaction
VLSI IEEE Transaction 2018 - IEEE Transaction
 
Noise insensitive pll using a gate-voltage-boosted source-follower regulator ...
Noise insensitive pll using a gate-voltage-boosted source-follower regulator ...Noise insensitive pll using a gate-voltage-boosted source-follower regulator ...
Noise insensitive pll using a gate-voltage-boosted source-follower regulator ...
 
An efficient fault tolerance design for integer parallel matrix vector
An efficient fault tolerance design for integer parallel matrix vectorAn efficient fault tolerance design for integer parallel matrix vector
An efficient fault tolerance design for integer parallel matrix vector
 
The implementation of the improved omp for aic reconstruction based on parall...
The implementation of the improved omp for aic reconstruction based on parall...The implementation of the improved omp for aic reconstruction based on parall...
The implementation of the improved omp for aic reconstruction based on parall...
 
Multilevel half rate phase detector for clock and data recovery circuits
Multilevel half rate phase detector for clock and data recovery circuitsMultilevel half rate phase detector for clock and data recovery circuits
Multilevel half rate phase detector for clock and data recovery circuits
 
Low complexity methodology for complex square-root computation
Low complexity methodology for complex square-root computationLow complexity methodology for complex square-root computation
Low complexity methodology for complex square-root computation
 
Fast neural network training on fpga using quasi newton optimization method
Fast neural network training on fpga using quasi newton optimization methodFast neural network training on fpga using quasi newton optimization method
Fast neural network training on fpga using quasi newton optimization method
 
Efficient fpga mapping of pipeline sdf fft cores
Efficient fpga mapping of pipeline sdf fft coresEfficient fpga mapping of pipeline sdf fft cores
Efficient fpga mapping of pipeline sdf fft cores
 
Approximate sum of-products designs based on distributed arithmetic
Approximate sum of-products designs based on distributed arithmeticApproximate sum of-products designs based on distributed arithmetic
Approximate sum of-products designs based on distributed arithmetic
 
An energy efficient programmable many core accelerator for personalized biome...
An energy efficient programmable many core accelerator for personalized biome...An energy efficient programmable many core accelerator for personalized biome...
An energy efficient programmable many core accelerator for personalized biome...
 
Algorithm and vlsi architecture design of proportionate type lms adaptive fil...
Algorithm and vlsi architecture design of proportionate type lms adaptive fil...Algorithm and vlsi architecture design of proportionate type lms adaptive fil...
Algorithm and vlsi architecture design of proportionate type lms adaptive fil...
 
A flexible wildcard pattern matching accelerator via simultaneous discrete fi...
A flexible wildcard pattern matching accelerator via simultaneous discrete fi...A flexible wildcard pattern matching accelerator via simultaneous discrete fi...
A flexible wildcard pattern matching accelerator via simultaneous discrete fi...
 
A fast and low complexity operator for the computation of the arctangent of a...
A fast and low complexity operator for the computation of the arctangent of a...A fast and low complexity operator for the computation of the arctangent of a...
A fast and low complexity operator for the computation of the arctangent of a...
 
A closed form expression for minimum operating voltage of cmos d flip-flop
A closed form expression for minimum operating voltage of cmos d flip-flopA closed form expression for minimum operating voltage of cmos d flip-flop
A closed form expression for minimum operating voltage of cmos d flip-flop
 
A 128 tap highly tunable cmos if finite impulse response filter for pulsed ra...
A 128 tap highly tunable cmos if finite impulse response filter for pulsed ra...A 128 tap highly tunable cmos if finite impulse response filter for pulsed ra...
A 128 tap highly tunable cmos if finite impulse response filter for pulsed ra...
 
A 12 bit 40-ms s sar adc with a fast-binary-window dac switching scheme
A 12 bit 40-ms s sar adc with a fast-binary-window dac switching schemeA 12 bit 40-ms s sar adc with a fast-binary-window dac switching scheme
A 12 bit 40-ms s sar adc with a fast-binary-window dac switching scheme
 
Nxfee Innovation Brochure
Nxfee Innovation BrochureNxfee Innovation Brochure
Nxfee Innovation Brochure
 

Recently uploaded

Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 

Recently uploaded (20)

Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 

Combating data leakage trojans in commercial and asic applications with time division multiplexing and random encoding

  • 1. NXFEE INNOVATION (SEMICONDUCTOR IP &PRODUCT DEVELOPMENT) (ISO : 9001:2015Certified Company), # 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam, Pondicherry– 605004, India. Buy Project on Online :www.nxfee.com | contact : +91 9789443203 | email : nxfee.innovation@gmail.com _________________________________________________________________ Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding Abstract: Globalization of microchip fabrication opens the possibility for an attacker to insert hardware Trojans into a chip during the manufacturing process. While most defensive methods focus on detection or prevention, a recent method, called Randomized Encoding of Combinational Logic for Resistance to Data Leakage (RECORD), uses data randomization to prevent hardware Trojans from leaking meaningful information even when the entire design is known to the attacker. Both RECORD and its sequential variant require significant area and power overhead. In this paper, a Time-Division Multiplexed version of the RECORD design process is proposed which reduces area overhead by 63% and power by 56%. This time-division multiplexing (TDM) concept is further refined to allow commercial off the shelf (COTS) products and IP cores to be safely operated from a separate chip. These new methods tradeoff latency (5.3× for TDM and 3.9× for COTS) and energy use to accomplish area and power savings and achieve greater security than the original RECORD process. Software Implementation:  Modelsim  Xilinx 14.2 Existing System: Detection and prevention of hardware Trojan attacks has become a major concern for a company wishing to outsource its hardware manufacturing. The threat of a hardware Trojan could lie dormant on a new chip for years before crippling it. Hardware Trojans could also steal encryption keys, passwords, or other sensitive information,
  • 2. NXFEE INNOVATION (SEMICONDUCTOR IP &PRODUCT DEVELOPMENT) (ISO : 9001:2015Certified Company), # 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam, Pondicherry– 605004, India. Buy Project on Online :www.nxfee.com | contact : +91 9789443203 | email : nxfee.innovation@gmail.com _________________________________________________________________ compromising security-critical systems. These data leakage Trojans can leak secret information out through Wi-Fi or even through the power signature itself. Detecting hardware Trojans has proven very difficult if not impossible. Some Trojans have been demonstrated to successfully operate with as little as five transistors. Most current methods of defense would be ineffective against such an attack. This problem extends beyond custom application specified integrated circuit (ASIC) designs and the firms creating them. Most companies buy commercial chips and are in no way involved in the design and production processes. Protecting against Trojan‘s in a commercial off-the-shelf (COTS) chip has so far been a mostly unexplored area of hardware Trojan defense. Current methods of detecting hardware Trojans after production involve runtime monitoring and post manufacture testing. Runtime monitoring and post manufacture testing rely on identifying the differences in chip operation introduced by the Trojan circuit. These methods depend on the tester‘s ability to trigger the Trojan circuit so the effects of the Trojan can be measured. For runtime monitoring and post manufacture testing to work, a ―golden chip‖ is usually needed for comparison, as simulation of the chip functionality is generally not accurate enough to show the very small changes introduced by the additional Trojan circuitry. How to produce the golden chip is a major problem. Furthermore, neither of these broad categories of Trojan protection is relevant for a third party company buying a COTS chip. A more reliable method of protection is to design the chip for security from the beginning. The concept of design for security (DFS) encompasses many possible ideas and methods, such as obfuscation layout camouflaging and split manufacturing. Obfuscation and layout camouflaging, however, are both susceptible to reverse engineering given enough time and effort. Split manufacturing is susceptible if multiple fabrication runs are used, which is often the case in modern design flows. This paper focuses on a new DFS method known as Randomized Encoding of Combinational Logic for Resistance to Data Leakage (RECORD) and more specifically
  • 3. NXFEE INNOVATION (SEMICONDUCTOR IP &PRODUCT DEVELOPMENT) (ISO : 9001:2015Certified Company), # 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam, Pondicherry– 605004, India. Buy Project on Online :www.nxfee.com | contact : +91 9789443203 | email : nxfee.innovation@gmail.com _________________________________________________________________ the sequential RECORD variant which can protect sensitive information from being leaked even when the full design is known to the attacker and multiple fabrication runs are needed. Sequential RECORD took the initial concept of RECORD, which was only specified for combinational logic, and extended it to sequential circuits. The method uses two randomly generated numbers to temporarily encode incoming data into a dual-rail signal. The random numbers represent one of the rails. Through Boolean manipulation and split manufacturing, the sequential RECORD process is able to effectively prevent any data leakage Trojans from capturing meaningful data from anywhere on the chip. This process does not try to detect or even prevent hardware Trojans on the chip. There is no longer any need. Any data captured by the attacks would be meaningless. The sequential RECORD process suffers from two drawbacks. First, the RECORD algorithm increases the area by almost 4× and the power by about 4.5×. And since it is a DFS method, it must be designed into the chip from the start making it useless for COTS applications. In this paper two modifications to the RECORD process are presented. The first, time-division multiplexing (TDM) RECORD, will show how the RECORD process can be modified to reduce the area and power overhead by 63% and 56%, respectively, at the expense of processing time and total energy used. Second, a scheme to use the RECORD concepts off chip to allow safe operation of COTS products is presented. Disadvantages:  Overhead is not reduced  Security is lower  Area and power savings is lower Proposed System: Time-division multiplexing
  • 4. NXFEE INNOVATION (SEMICONDUCTOR IP &PRODUCT DEVELOPMENT) (ISO : 9001:2015Certified Company), # 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam, Pondicherry– 605004, India. Buy Project on Online :www.nxfee.com | contact : +91 9789443203 | email : nxfee.innovation@gmail.com _________________________________________________________________ RECORD provides excellent protection for custom ASIC designs both for combinational or sequential circuits. It does, however, carry a large area and power overhead, approximately 3.75× area and 4.5× power for sequential RECORD. RECORD also benefits from using a simple and generic implementation that can be easily adapted to any design with no circuit specific logic or control. When area or power is at a premium a different approach is needed. TDM offers a perfect solution to reduce the power and area overhead. The sequential RECORD process contains four copies of the same logic. This serves two purposes; it allows for quick parallel processing of the four input vectors and helps to confuse attackers. TDM RECORD eliminates the duplication while at the same time opening up possibilities for an even more secure protection scheme. The intermediate combinational logic is copied four times and operated on in parallel. The only difference between the blocks is that each block of logic is sent a different input vector. In TDM RECORD, the four variant input combinations can be sent in sequence to just one copy of the intermediate logic instead of four. The outputs of the intermediate logic are then stored in one of the four register blocks before being demuxed to determine the final correct output. The register blocks are not the same as in sequential RECORD. In TDM RECORD, all four outputs are not available in the same clock cycle. Each intermediate output vector, g1–4, is stored on subsequent clock cycles until all four input vectors have completed.
  • 5. NXFEE INNOVATION (SEMICONDUCTOR IP &PRODUCT DEVELOPMENT) (ISO : 9001:2015Certified Company), # 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam, Pondicherry– 605004, India. Buy Project on Online :www.nxfee.com | contact : +91 9789443203 | email : nxfee.innovation@gmail.com _________________________________________________________________ Fig. 1. Registers for each round of TDM RECORD and the reindexing logic The four stored outputs are then demuxed with the two random bits as select signals, as before. The new output is reindexed against two newly generated random bits before being sent on to the next set of intermediate logic, as shown in Fig. 1. The random bits must be stored for four clocks cycles and used to generate g1–4 instead of changing on each cycle. This restriction means that control logic is needed to orchestrate when new random bits are needed and into which register block the intermediate outputs, g1–4, are placed. The entire process is illustrated in Fig. 2. At clock cycle T , the incoming data vector is converted to the dual-rail representation with r1 and r2. The new input bits, t, are then sent to the first logic block. The output is then stored in register block 1. At clock cycle, T + 1, the same input bits, t, are sent back to the same logic block but with some of the inputs inverted. The outputs are stored in register
  • 6. NXFEE INNOVATION (SEMICONDUCTOR IP &PRODUCT DEVELOPMENT) (ISO : 9001:2015Certified Company), # 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam, Pondicherry– 605004, India. Buy Project on Online :www.nxfee.com | contact : +91 9789443203 | email : nxfee.innovation@gmail.com _________________________________________________________________ Fig. 2. Conceptual dataflow diagram for TDM RECORD process showing the first round of data processing.
  • 7. NXFEE INNOVATION (SEMICONDUCTOR IP &PRODUCT DEVELOPMENT) (ISO : 9001:2015Certified Company), # 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam, Pondicherry– 605004, India. Buy Project on Online :www.nxfee.com | contact : +91 9789443203 | email : nxfee.innovation@gmail.com _________________________________________________________________ Fig. 3. COTS RECORD dataflow between the two chips. block 2. This process is repeated two more times with the bits of t being inverted or not inverted. Finally at clock cycle T +4, the register blocks are demuxed using r1 and r2 as select signals. Here, r1 and r2 have not been allowed to change from cycle to cycle but have been stored since cycle T . At clock cycle T + 5 the random bits are allowed to change, the output of the register block is updated, and the process begins again. T he security of the random bits is maintained with split manufacturing. The upper tier would contain the control logic, the input multiplexers, registers with XOR gates, output registers, and final demux. The bottom tier contains all of the intermediate logic. Storing the random bits for four clock cycles does nothing to compromise the security. An attacker would still need to wait until all four input data vectors have processed before attempting to infer the random bit, at which time the bit would change just as in sequential RECORD. TDM RECORD gives some obfuscation options that were not
  • 8. NXFEE INNOVATION (SEMICONDUCTOR IP &PRODUCT DEVELOPMENT) (ISO : 9001:2015Certified Company), # 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam, Pondicherry– 605004, India. Buy Project on Online :www.nxfee.com | contact : +91 9789443203 | email : nxfee.innovation@gmail.com _________________________________________________________________ available with RECORD or sequential RECORD. First, sequential RECORD was resistant to attackers inferring the random bits by reading the signals moving between upper and lower tiers. However, remote possibilities still existed of inferring the encoded data if the attacker knew which combinational block was receiving which input vector, which input bits were indexed against which random bits, and finally knew the indexing of the returning register outputs. Fig. 2. shows Conceptual dataflow diagram for TDM RECORD process showing the first round of data processing. By making use of the random number generator/s (RNG) in TDM RECORD, the control logic can randomly change the order in which the input vectors are presented to the logic. For example, the first iteration could present the input vectors in normal order (1, 2, 3, and 4) but the next iteration could present them in the order (2, 3, 1, and 4) and so on. Second, to further frustrate attackers, the number of random bits can be increased. Adding a third random bit was previously infeasible due to the excessive area and power overhead. Now that third random bit would increase the number of input vector variations by up to eight but at a very small cost to additional area and power. Only four additional register blocks and alterations to the control logic are needed while at the COTS application RECORD in all its variations provides excellent protection against hardware Trojan attacks. However, they are applicable only to custom ASIC chips. Quilt Packaging and 3- D manufacturing are not cheap. The cost of manufacturing a RECORD or sequential RECORD design would be many times the cost of a standard chip. While acceptable in certain cases, these packaging options may be cost prohibitive in others. Many
  • 9. NXFEE INNOVATION (SEMICONDUCTOR IP &PRODUCT DEVELOPMENT) (ISO : 9001:2015Certified Company), # 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam, Pondicherry– 605004, India. Buy Project on Online :www.nxfee.com | contact : +91 9789443203 | email : nxfee.innovation@gmail.com _________________________________________________________________ applications, especially military ones, are moving to COTS chips to meet specifications and budget. These chips are even more susceptible to hardware Trojan injection since there may not be any hardware security plan in mind when they are designed. A recent paper has identified commercial parts as the number one area needing research and a solution for preventing hardware Trojans attacks. The TDM RECORD process presents an excellent opportunity to prevent data leakage when using COTS ICs. TDM RECORD can be extended to a COTS chip by moving the TDM RECORD control logic to a separate chip, such as an FPGA. The registers on the COTS chip cannot be moved nor can they be individually accessed in most cases. Consequently, the TDM process of injecting the appropriate data vectors into each intermediate logic block is no longer applicable. The second chip of the COTS RECORD process must now send each of the four input data vectors to the COTS chip and wait for the chip to fully complete its operation. The process is shown in Fig. 3. In the case of a Data Encryption Standard (DES) chip, this process would take 16 cycles to produce a final encoded output. That output would then be stored in the control chip and the next of four input vectors would be sent. While the four input vectors are being operated upon, only one set of random bits is used and stored on the control chip. There is no need to send them to the COTS chip, so they are safe from detection. When all four vectors have been processed, the control chip will demux the results using the random bits as select signals and convert them back to single rail before sending the final output to its original destination. Advantages:  Overhead is reduced  Security is higher  Area and power savings is higher References:
  • 10. NXFEE INNOVATION (SEMICONDUCTOR IP &PRODUCT DEVELOPMENT) (ISO : 9001:2015Certified Company), # 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam, Pondicherry– 605004, India. Buy Project on Online :www.nxfee.com | contact : +91 9789443203 | email : nxfee.innovation@gmail.com _________________________________________________________________ [1] Y. Jin and Y. Makris, ―Hardware trojans in wireless cryptographic ICs,‖ IEEE Design Test Comput., vol. 27, no. 1, pp. 26–35, Jan./Feb. 2010. [2] L. Lin, M. Kasper, T. Güneysu, C. Paar, and W. Burleson, ―Trojan side-channels: Lightweight hardware trojans through side-channel engineering,‖ in Cryptographic Hardware and Embedded Systems—CHES (Lecture Notes in Computer Science), vol. 5747. Berlin, Germany: Springer, 2009, pp. 382–395. [3] K. Yang, M. Hicks, Q. Dong, T. Austin, and D. Sylvester, ―A2: Malicious hardware,‖ in Proc. IEEE Symp. Secur. Privacy, San Jose, CA, USA, May 2016, pp. 18–37. [4] C. A. Kamhoua, M. Rodriguez, and K. A. Kwiat, ―Testing for hardware trojans: A game-theoretic approach,‖ in Decision and Game Theory for Security,‖ (Lecture Notes in Computer Science), vol. 8840. Cham, Switzerland: Springer, 2014, pp. 360–369. [ [5] M. Rostami, F. Koushanfar, and R. Karri, ―A primer on hardware security: Models, methods, and metrics,‖ Proc. IEEE, vol. 102, no. 8, pp. 1283–1295, Aug. 2014. [6] R. S. Chakraborty and S. Bhunia, ―Security against hardware trojan through a novel application of design obfuscation,‖ in Proc. Int. Conf. Comput.-Aided Design (ICCAD), New York, NY, USA, Nov. 2009, pp. 113–116. [7] J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, ―Security analysis of integrated circuit camouflaging,‖ in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2013, pp. 709–720. [8] J. Rajendran, O. Sinanoglu, and R. Karri, ―Is split manufacturing secure?‖ in Proc. Conf. Design, Autom. Test Europe, DATE, vol. 13, 2013, pp. 1259–1264. [9] R. Dura, S. Hidalgo, R. Quijada, A. Raventos, and T. Francesc, ―The use of digital image processing for IC reverse engineering,‖ in Proc. 11th Int. Multi-Conf. Syst., Signals Devices (SSD), Feb. 2014, pp. 1–4. [10] D. E. Dilger. (Jan. 14, 2016). Apple A9 Chip fab TSMC Reports Record Earnings, Casting Further Doubt on ‗Peak iPhone‘. [Online]. Available: http://appleinsider.com/articles/16/01/14/apple-a9- chip- fab-tsmc-reports-record-earnings-casts-doubt-on-peak-iphone
  • 11. NXFEE INNOVATION (SEMICONDUCTOR IP &PRODUCT DEVELOPMENT) (ISO : 9001:2015Certified Company), # 45, Vivekanandar Street, Dhevan kandappa Mudaliar nagar, Nainarmandapam, Pondicherry– 605004, India. Buy Project on Online :www.nxfee.com | contact : +91 9789443203 | email : nxfee.innovation@gmail.com _________________________________________________________________ [11] T. E. Schulze, Y. Shi, C. Kamhoua, K. Kwiat, and S. Chang, ―RECORD: Temporarily randomized encoding of combinational logic for resistance to data leakage from hardware trojan,‖ in Proc. Asian HOST, Yilan, Taiwan, Dec. 2016, pp. 1–6. [12] T. E. Schulze, K. Kwiat, C. Kamhoua, D. Beetner, L. Njilla, and Y. Shi, ―Combating data leakage trojans in sequential circuits through randomized encoding,‖ in Proc. IEEE Dependable, Autonomic Secure Comput. (DASC), Orlando, FL, USA, Nov. 2017, pp. 639–644. [13] J. T. McDonald, Y. Kim, and D. Koranek, ―Deterministic circuit variation for anti-tamper applications,‖ in Proc. 7th Annu. Workshop Cyber Secur. Inf. Intell. Res., 2011, Art. no. 68.