Wang, Xiaohang and Cao, Ge and Zhao, Yiming and Jiang, Yingtao and Singh, Amit Kumar and Yang, Mei and Wang, Liang and Han, Yinhe and Guo, Fen (2026) Online detection of hardware Trojan enabled packet tampering attack on network-on-chip: A Bayesian approach. Integration, the VLSI Journal, 106. p. 102506. DOI https://doi.org/10.1016/j.vlsi.2025.102506 (In Press)
Wang, Xiaohang and Cao, Ge and Zhao, Yiming and Jiang, Yingtao and Singh, Amit Kumar and Yang, Mei and Wang, Liang and Han, Yinhe and Guo, Fen (2026) Online detection of hardware Trojan enabled packet tampering attack on network-on-chip: A Bayesian approach. Integration, the VLSI Journal, 106. p. 102506. DOI https://doi.org/10.1016/j.vlsi.2025.102506 (In Press)
Wang, Xiaohang and Cao, Ge and Zhao, Yiming and Jiang, Yingtao and Singh, Amit Kumar and Yang, Mei and Wang, Liang and Han, Yinhe and Guo, Fen (2026) Online detection of hardware Trojan enabled packet tampering attack on network-on-chip: A Bayesian approach. Integration, the VLSI Journal, 106. p. 102506. DOI https://doi.org/10.1016/j.vlsi.2025.102506 (In Press)
Abstract
Hardware Trojans (HTs), proven difficult to be detected and removed at the offline post-silicon stage, can secretly launch dangerous packet tampering attacks on the network-on-chip (NoC) of a many-core chip. In this paper, we present an online HT detection scheme that is based on continuous, on-the-fly assessment of how likely any single node in the NoC includes an HT. In specific, the scheme first collects the routing path information of any data packet flowing through the NoC. The probability of a node being infected with HTs will next be determined based on each packet’s authentication result and this probability is iteratively updated through Bayesian analysis. A node shall be marked as a high-risk node, if its probability of infection exceeds a threshold, and all the high-risk nodes thus discovered will be bypassed by any future traffic. Since the proposed scheme only needs end-to-end authentication, as opposed to costly hop-to-hop authentication, the hardware overhead is kept low. To help further reduce the bandwidth and computation overheads, three approximate schemes are also proposed. Experiments have confirmed that the proposed HT detection methods can effectively locate the malicious nodes and thus reduce the infection rate to below 5%.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Networks-on-chip, online detection of hardware Trojan |
Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 17 Sep 2025 14:02 |
Last Modified: | 05 Oct 2025 11:23 |
URI: | http://repository.essex.ac.uk/id/eprint/41594 |
Available files
Filename: paper-0622.pdf