Checkpoints Assignment on Cyber-Physical Digital Microfluidic Biochips for Early Detection of Hardware Trojans
Title | Checkpoints Assignment on Cyber-Physical Digital Microfluidic Biochips for Early Detection of Hardware Trojans |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Gountia, Debasis, Roy, Sudip |
Conference Name | 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) |
ISBN Number | 978-1-5386-9439-8 |
Keywords | biochemical analysis, biochip design flow, biochips, biological techniques, bioprotocol manipulation attacks, checkpoint, checkpointing, checkpoints assignment, Computer crime, cyber physical systems, cyber-physical digital microfluidic biochips, Cyber-physical systems, denial-of-service attacks, digital microfluidic biochip, diseases, DMF biochip, Electrodes, error detection, error-recovery sensing systems, frequent diseases detection, Hardware, hardware trojan, hardware Trojans attacks, invasive software, lab-on-a-chip, microfluidics, piracy attacks, pubcrawl, resilience, Resiliency, security, security concern, security study, Sequential analysis, supply chain security, Tools, trojan horse detection, Trojan horses |
Abstract | Present security study involving analysis of manipulation of individual droplets of samples and reagents by digital microfluidic biochip has remarked that the biochip design flow is vulnerable to piracy attacks, hardware Trojans attacks, overproduction, Denial-of-Service attacks, and counterfeiting. Attackers can introduce bioprotocol manipulation attacks against biochips used for medical diagnosis, biochemical analysis, and frequent diseases detection in healthcare industry. Among these attacks, hardware Trojans have created a major threatening issue in its security concern with multiple ways to crack the sensitive data or alter original functionality by doing malicious operations in biochips. In this paper, we present a systematic algorithm for the assignment of checkpoints required for error-recovery of available bioprotocols in case of hardware Trojans attacks in performing operations by biochip. Moreover, it can guide the placement and timing of checkpoints so that the result of an attack is reduced, and hence enhance the security concerns of digital microfluidic biochips. Comparative study with traditional checkpoint schemes demonstrate the superiority of the proposed algorithm without overhead of the bioprotocol completion time with higher error detection accuracy. |
URL | https://ieeexplore.ieee.org/document/8862598 |
DOI | 10.1109/ICOEI.2019.8862598 |
Citation Key | gountia_checkpoints_2019 |
- Resiliency
- Hardware
- hardware trojan
- hardware Trojans attacks
- invasive software
- Lab-on-a-Chip
- Microfluidics
- piracy attacks
- pubcrawl
- resilience
- frequent diseases detection
- security
- security concern
- security study
- Sequential analysis
- supply chain security
- tools
- trojan horse detection
- Trojan horses
- cyber-physical digital microfluidic biochips
- biochip design flow
- biochips
- biological techniques
- bioprotocol manipulation attacks
- checkpoint
- checkpointing
- checkpoints assignment
- Computer crime
- cyber physical systems
- biochemical analysis
- cyber-physical systems
- denial-of-service attacks
- digital microfluidic biochip
- diseases
- DMF biochip
- Electrodes
- error detection
- error-recovery sensing systems