Font Size: a A A

Characteristics And Detection Technology Of The Hardware Trojan In Digital IC

Posted on:2013-03-03Degree:MasterType:Thesis
Country:ChinaCandidate:L YuFull Text:PDF
GTID:2248330392956844Subject:IC Engineering
Abstract/Summary:PDF Full Text Request
The relative independence of all stages in today’s integrated circuit design and theindustrial form of the separation between IC chip design and chip manufacturing processresult in the attacker could get a chance to inject the hardware Trojan with a specificmalicious function into circuit of the IC chip in design or manufacturing stage. However,the IC chips has long been widely used in various fields of national economy, there willbe serious consequences in all aspects of society if the hardware Trojan attack occurs.This subject first design and optimize a128-bit AES encryption circuit according tothe AES algorithm, and as the original reference design, in which different types ofhardware Trojans are implemented to explore the characteristics and detection methods ofthe hardware Trojan in digital IC design from the following three relatively independentdirections: FPGA design flow. Firstly, we implement the AES reference design and theTrojan injected design on the FPGA chip. Then we set up a detection platform with thesoft core processor NIOS II in altera FPGA to testing the AES encryption circuit designand detecting the Trojans injected in it. ASIC design flow. Implement the backend designof AES encryption circuit design and the Trojan injected design, then, compare therelated fingerprint information, like CTS structure, to explore potential ways of detectinghardware Trojans in ASIC design flow. Probabilistic signature theory. With the help ofthis theory to analyze the equivalence of a function module in the AES reference design.This paper aims to provide certain reference value in IC chip security field and hopeto have a positive and important impact on the information security in the field ofnational defense, military and national financial which are security sensitive.
Keywords/Search Tags:Hardware Trojan, AES, FPGA, ASIC, Backend Design, AP&R
PDF Full Text Request
Related items