62 research outputs found

    A compressive sensing algorithm for hardware trojan detection

    Get PDF
    Traditionally many fabless companies outsource the fabrication of IC design to the foundries, which may not be trusted always. In order to ensure trusted IC’s it is more significant to develop an efficient technique that detects the presence of hardware Trojan. This malicious insertion causes the logic variation in the nets or leaks some sensitive information from the chip, which reduces the reliability of the system. The conventional testing algorithm for generating test vectors reduces the detection sensitivity due to high process variations. In this work, we present a compressive sensing approach, which can significantly generate optimal test patterns compared to the ATPG vectors. This approach maximizes the probability of Trojan circuit activation, with a high level of Trojan detection rate. The side channel analysis such as power signatures are measured at different time stamps to isolate the Trojan effects. The effect of process noise is minimized by this power profile comparison approach, which provides high detection sensitivity for varying Trojan size and eliminates the requirement of golden chip. The proposed test generation approach is validated on ISCAS benchmark circuits, which achieves Trojan detection coverage on an average of 88.6% reduction in test length when compared to random pattern

    Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques

    Get PDF
    Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to protect their designs from the threats posed by the foundries. Few of the threats are IP piracy, counterfeiting and reverse engineering. To overcome these, logic encryption has been observed to be a leading countermeasure against the threats faced. It introduces extra gates in the design, known as key gates which hide the functionality of the design unless correct keys are fed to them.  The scan tests are used by various designs to observe the fault coverage. These scan chains can become vulnerable to side-channel attacks. The potential solution for protection of this vulnerability is obfuscation of the scan output of the scan chain. This involves shuffling the working of the cells in the scan chain when incorrect test key is fed. In this paper, we propose a method to overcome the threats posed to scan design as well as the logic circuit. The efficiency of the secured design is verified on ISCAS’89 circuits and the results prove the security of the proposed method against the threats posed

    Video Based Emotion Recognition Using CNN and BRNN

    Get PDF
    Video-based Emotion recognition is rather challenging than vision task. It needs to model spatial information of each image frame as well as the temporal contextual correlations among sequential frames. For this purpose, we propose hierarchical deep network architecture to extract high-level spatial temporal features. Two classic neural networks, Convolutional neural network (CNN) and Bi-directional recurrent neural network (BRNN) are employed to capture facial textural characteristics in spatial domain and dynamic emotion changes in temporal domain. We endeavor to coordinate the two networks by optimizing each of them to boost the performance of the emotion recognition as well as to achieve greater accuracy as compared with baselines

    Lightweight PUF-Based Gate Replacement Technique to Reduce Leakage of Information through Power Profile Analysis

    Get PDF
    The major challenge faced by electronic device designers is to defend the system from attackers and malicious modules called Hardware Trojans and to deliver a secured design. Although there are many cryptographic preventive measures in place adversaries find different ways to attack the device. Differential Power Analysis (DPA) attack is a type of Side Channel Attacks, used by an attacker to analyze the power leakage in the circuit, through which the functionality of the circuit is extracted. To overcome this, a lightweight approach is proposed in this paper using, Wave Dynamic Differential Logic (WDDL) technique, without incurring any additional resource cost and power. The primary objective of WDDL is to make the power consumption constant of an entire circuit by restricting the leakage power. The alternate strategy used by an adversary is to leak the information through reverse engineering. The proposed work avoids this by using a bit sequencer and a modified butterfly PUF based randomizing architecture. A modified version of butterfly PUF is also proposed in this paper, and from various qualitative tests performed it is evident that this PUF can prevent information leakage. This work is validated on ISCAS 85, ISCAS 89 benchmark circuits and the results obtained indicate that the difference in leakage power is found to be very marginal

    A study to assess the effectiveness of Tender coconut water in reducing pain during Micturition among children with Urinary tract infection admitted in Urological ward at Institute of Child Health and Hospital for Children, Chennai.

    Get PDF
    Children are the vulnerable group in the society; they need a prompt care and attention to prevent and minimize certain conditions like urinary tract infection. In this study the investigator adapted consuming of coconut water on reducing the pain during micturition. Need for Study: Coconut water is traditionally prescribed for burning pain during urination, dysuria, gastritis, burning pain of the eyes, indigestion and hiccups or even expelling of retained placenta. Objectives :To identify the socio demographic variables of the children, to assess the pain level during micturition before administration of tender coconut water in children with urinary tract infection, to evaluate the pain level during micturition after administration of tender coconut water in children with urinary tract infection, to determine the effectiveness of administration of tender coconut water on reducing pain among the children with urinary tract infection, to find association between the selected demographic variables with post test scores of reducing pain among the children with urinary tract infection. Results: The finding showed that there is a significant improvement in children taking tender coconut water with p value of t=4.282. Discussion: Hypothesis was proved by the great statistically significance occurs after administered of tender coconut water. The chi square test shows that there is statistically significant association between with selected demographic variable with previous hospitalization and religion. Conclusion: Tender coconut water which contains antioxidants and diuretic properties and it is effective in the successful management of urinary tract infection of maturation pain

    Measuring Research Contributions of Prof. Anurag Kumar: A Scientometric Analysis

    Get PDF
    The present study aims to measure the contributions of Prof. Anurag Kumar, who served as the Director at the Indian Institute of Science (IISc) in Bengaluru between August 2014 to July 2020. He has contributed 181 publications during his 36 years of career. He has published his majority of publications 171 (94.48%) in collaboration; most active collaborators with Prof. Anurag Kumar are Altman E. with (17) publications, Kuri Joy (15), Anand (14), and Singh (12). His highest Collaboration Coefficient found is 0.73 in 2013, and the highest Modified Collaboration Coefficient is 1.33 in the year 2018. The highest degree of collaboration observed for Prof. Anurag Kumar was 1.00. The highest Collaborative Index of Prof. Anurag found is 4.75 in the year 2016. His publications received 2595 citations so far, with 14.3 citations for each publication and an average citation of 72.08 per year. He has produced most of his publications in the field of computer science (45.9%). He preferred conference papers as his communication channel, where he published 100 (55.24%) papers out of 181. Prof. Anurag Kumar has contributed the highest (62) publication between 2005-2010, and he has published his first publication at the age of 30

    Implementation of a Simplified Cultural-Based Multi-Objective Particle Swarm Optimization

    Get PDF
    This paper presents a simplified Cultural based Multi-Objective Particle Swarm Optimization (MOPSO) algorithm. In this algorithm we modify momentum and global acceleration components of the conventional MOPSO algorithm. The algorithm has been tested on common benchmark functions. Its performance has been compared with other algorithms, using standard test metrics. The results show that the cultural based MOPSO is more efficient and robust

    Detection of Malicious Circuitry using Transition Probability Based Node Reduction Technique

    Get PDF
    In recent years, serious concerns have been raised against the tampering of integrated circuits due to outsourcing of circuits for fabrication. It has led to the addition of malicious circuitry known as Hardware Trojan. In this paper, a transition probability based node reduction technique for faster and efficient Hardware Trojan (HT) detection has been attempted. In the proposed method, the fact that the least controllable and observable nodes or the nodes with least transition probability are more vulnerable as Trojan sites is taken into consideration. The nodes that have lesser activity than the threshold are the candidate nodes. At each candidate node, segmentation is done for further leakage power analysis to detect the presence of Trojans. Experimental results observed on ISCAS’85 and ISCAS’89 benchmark circuits illustrate that the proposed work can achieve remarkable node reduction upto 78.81% and time reduction upto 58.7%. It was also observed that the circuit activity can be increased by varying the input probability. Hence, for further reduction in the Trojan activation time, the weighted input probability was obtained

    Anomalous origin of the left vertebral artery from the arch of the aorta: review of the literature and a case report

    Get PDF
    The present report describes an anomalous case of the left vertebral artery arising from the aortic arch between the left common carotid artery and the left subclavian artery in a male cadaver during dissection in an anatomical laboratory. Aortic origin of the vertebral artery is a rare anatomic variant. Detailed knowledge of anomalous origin is important for patients who undergo four-vessel angiography. Normally, the vertebral artery arises from the first part of the subclavian artery on both sides. We also review the anomalous origin of the vertebral artery in the literature and discuss its clinical significance. (Folia Morphol 2010; 69, 4: 258-260
    • …
    corecore