Title | ||
---|---|---|
Neutralization of the Effect of Hardware Trojan in SCADA System Using Selectively Placed TMR |
Abstract | ||
---|---|---|
Supervisory Control And Data Acquisition (SCADA) systems are the primary technology used to automate our critical infrastructure and major industries in order to improve their efficiency. Their dependability is challenged by probable vulnerabilities in the core computing system. These vulnerabilities can be appear on both front (software) and back (hardware) ends of the computing system. While the software vulnerabilities are well researched and documented, the hardware threats are normally overlooked. However, with hardware-inclusive technological evolutions like Cyber-Physical Systems and Internet-of-Things, hardware vulnerabilities should be addressed appropriately. Hardware Trojans are malicious alterations in the systems that leak confidential information or disable the entire system. In order to achieve a countermeasure, we propose to neutralize the effect of Hardware Trojans through a Triple Modular Redundancy (TMR) based methodology. In order to address the inevitable overhead on area, TMR will be implemented only on select paths of the system i.e., equally probable output paths which are found vulnerable to Trojan placement. In this work, we propose to neutralize the effect of hardware Trojan based vulnerabilities in SCADA systems, with the use of selectively placed TMR methodology. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1109/iNIS.2017.30 | 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS) |
Keywords | DocType | ISBN |
Hardware Trojans,Neutralization,TMR,SCADA system | Conference | 978-1-5386-1357-3 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Nagendra Babu Gunti | 1 | 0 | 0.68 |
Karthikeyan Lingasubramanian | 2 | 41 | 5.12 |