{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:35Z","timestamp":1750221095321,"version":"3.41.0"},"reference-count":47,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T00:00:00Z","timestamp":1552867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Department of Science and Technology, Government of India, INSPIRE Fellowship","award":["IF150916"],"award-info":[{"award-number":["IF150916"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2019,3,31]]},"abstract":"<jats:p>The semiconductor design industry of the embedded era has embraced the globalization strategy for system on chip (SoC) design. This involves incorporation of various SoC components or intellectual properties (IPs), procured from various third-party IP (3PIP) vendors. However, trust of an SoC is challenged when a supplied IP is counterfeit or implanted with a Hardware Trojan Horse. Both roots of untrust may result in sudden performance degradation at runtime. None of the existing hardware security approaches organize the behavior of the IPs at the low level, to ensure timely completion of SoC operations. However, real-time SoC operations are always associated with a deadline, and a deadline miss due to sudden performance degradation of any of the IPs may jeopardize mission-critical applications. We seek refuge to the stigmergic behavior exhibited in insect colonies to propose a decentralized self-aware security approach. The self-aware security modules attached with each IP works based on the Observe-Decide-Act paradigm and not only detects vulnerability but also organizes behavior of the IPs dynamically at runtime so that the high-level objective of task completion before a deadline is ensured. Experimental validation and low overhead of our proposed security modules over various benchmark IPs and crypto SoCs depict the prospects of our proposed mechanism.<\/jats:p>","DOI":"10.1145\/3301279","type":"journal-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T12:09:30Z","timestamp":1552910970000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Stigmergy-Based Security for SoC Operations From Runtime Performance Degradation of SoC Components"],"prefix":"10.1145","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1139-9582","authenticated-orcid":false,"given":"Krishnendu","family":"Guha","sequence":"first","affiliation":[{"name":"University of Calcutta, India"}]},{"given":"Debasri","family":"Saha","sequence":"additional","affiliation":[{"name":"University of Calcutta, India"}]},{"given":"Amlan","family":"Chakrabarti","sequence":"additional","affiliation":[{"name":"University of Calcutta, India"}]}],"member":"320","published-online":{"date-parts":[[2019,3,18]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jare.2013.11.008"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"e_1_2_1_3_1","unstructured":"Defense Science Board. 2005. Defense Science Board Task Force on High Performance Microchip Supply. Available at https:\/\/www.acq.osd.mil\/dsb\/reports\/2000s\/ada435563.pdf.  Defense Science Board. 2005. Defense Science Board Task Force on High Performance Microchip Supply. Available at https:\/\/www.acq.osd.mil\/dsb\/reports\/2000s\/ada435563.pdf."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/359094.359101"},{"key":"e_1_2_1_5_1","unstructured":"S. Camazine J. L. Deneubourg N. R. Franks J. Sneyd G. Theraulaz and E. Bonabeau. 2001. Self Organization in Biological Systems. Princeton University Press Princeton NJ.   S. Camazine J. L. Deneubourg N. R. Franks J. Sneyd G. Theraulaz and E. Bonabeau. 2001. Self Organization in Biological Systems. Princeton University Press Princeton NJ."},{"volume-title":"Challenging US Defense Industry and National Security. IHS Markit. Retrieved","year":"2012","author":"Cassell J.","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-011-5255-2"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAPT.2007.906050"},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"A. Cornejo A. Dornhaus N. Lynch and R. Nagpal. 2014. Task Allocation in Ant Colonies. Springer Berlin Germany 46--60.  A. Cornejo A. Dornhaus N. Lynch and R. Nagpal. 2014. Task Allocation in Ant Colonies. Springer Berlin Germany 46--60.","DOI":"10.1007\/978-3-662-45174-8_4"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593150"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-016-1626-6"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/3477.484436"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00265-008-0634-0"},{"volume-title":"Proceedings of the IEEE Congress on Evolutionary Computation. 1--8.","author":"Falcon R.","key":"e_1_2_1_16_1"},{"volume-title":"Proceedings of the 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST\u201915)","author":"Ghosh S.","key":"e_1_2_1_17_1"},{"volume-title":"Proceedings of the 2015 19th International Symposium on VLSI Design and Test. 1--6.","author":"Guha K.","key":"e_1_2_1_18_1"},{"volume-title":"Proceedings of the 2017 30th International Conference on VLSI Design and the 2017 16th International Conference on Embedded Systems (VLSID\u201917)","author":"Guha K.","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3014166"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-013-5430-8"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2015.12.002"},{"volume-title":"Retrieved","year":"2013","author":"ITRS.","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"crossref","unstructured":"J. Keane X. Wang P. Jain and C. H. Kim. 2014. On-chip silicon odometers for circuit aging characterization. In Bias Temperature Instability for Devices and Circuits. Springer 679--717.  J. Keane X. Wang P. Jain and C. H. Kim. 2014. On-chip silicon odometers for circuit aging characterization. In Bias Temperature Instability for Devices and Circuits. Springer 679--717.","DOI":"10.1007\/978-1-4614-7909-3_27"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the IEEE International Conference on Neural Networks","volume":"4","author":"Kennedy J.","year":"1942"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2008.917502"},{"volume-title":"Proceedings of the 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS\u201913)","author":"Liu C.","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160627"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224990"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.200"},{"volume-title":"Retreived","year":"2016","author":"Benchmarks OpenCores","key":"e_1_2_1_31_1"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2006.1628506"},{"volume-title":"Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium (IOLTS\u201913)","author":"Rajendran J.","key":"e_1_2_1_33_1"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2530092"},{"volume-title":"Proceedings of the 2015 Design, Automation, and Test in Europe Conference and Exhibition (DATE\u201915)","author":"Sarma S.","key":"e_1_2_1_35_1"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2016.2597232"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2013.6548889"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278484"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732408"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.059"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.1998.0299"},{"key":"e_1_2_1_42_1","doi-asserted-by":"crossref","unstructured":"J. Werfel K. Petersen and R. Nagpal. 2014. Designing collective behavior in a termite inspired robot construction team. Science 343 6172 (2014) 754--758.  J. Werfel K. Petersen and R. Nagpal. 2014. Designing collective behavior in a termite inspired robot construction team. Science 343 6172 (2014) 754--758.","DOI":"10.1126\/science.1245842"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2013.2249555"},{"volume-title":"Retrieved","year":"2018","author":"Xilinx Inc.","key":"e_1_2_1_44_1"},{"volume-title":"Proceedings of the 2009 World Congress on Nature Biologically Inspired Computing (NaBIC\u201909)","author":"Yang X. S.","key":"e_1_2_1_45_1"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2012.6378192"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2014.2326556"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301279","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:58:02Z","timestamp":1750208282000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301279"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,18]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3,31]]}},"alternative-id":["10.1145\/3301279"],"URL":"https:\/\/doi.org\/10.1145\/3301279","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2019,3,18]]},"assertion":[{"value":"2017-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-03-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}