Font Size: a A A

Design, Implementation And Analysis Of Digital Hardware Trojrn

Posted on:2015-11-27Degree:MasterType:Thesis
Country:ChinaCandidate:Z LiFull Text:PDF
GTID:2308330473453217Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
IC play a vital role in various fields of modern technology, these applies from smart phones, automotive electronics, medical equipment to the national strategic militarily weapons, chips are inseparable. Now chip design division of labor makes people can’t control the entire chain in integrated circuit, an attacker can use the integrated circuit design or manufacturing phase to modify the circuit and implant Hardware Trojan circuit. Hardware Trojan design and detection methods has become a new popular research fields in integrated circuit.Based on these, this paper mainly studies Hardware Trojan design method, ARM9 processor core is selected as target circuit. Hardware Trojan design strategies at RTL and net-list level was studied in this article. Dozens of Trojans has been designed at ARM9 which change original circuit function, reduce the performance and disclosure information Trojan. Finally, software simulation test Trojan circuit function, using FPGA to prove Trojan horse low detection ability. Combined with the three design rules proposed at RTL level, making a summary of the performance of the Trojan circuit.The research contents and contributions include:Firstly, this paper introduces the existing Hardware Trojan technology. Including HT characteristics, classification, general design and detection methods. Their advantages and disadvantages are analyzed.Secondly, Hardware Trojan attack model is constructed. This model from the perspective of the attacker. The whole process of implant Trojan and attack chip are given. With the target circuit ARM9 core, attack points of the circuit are given.Thirdly, Hardware Trojan design strategies were put forward. Including three design rules in RTL-level, and net-list level design rules, also given how to protect Trojan circuit. Based on these strategies, 14 Trojan circuits are designed: eight modified original circuit function, two Trojan who lower circuit performance, a Trojan disclosure circuit information, as well as a net-list level Trojan. At the same time, given each horse design method and design purpose. Each circuit in the paper is focus on how to design the Trojan trigger circuit.Lastly, making hardware Trojan detection plans. Through software simulation to show Trojans function, using FPGA verify triggered circuit actual working conditions. Combined with the power, size, and trigger rate after Trojan implanted into original circuit, evaluating the performance of Trojan and giving the conclusion of low detection ability for hardware Trojan. In order to simulate ARM9 actual work environment, ten embedded programs are designed.
Keywords/Search Tags:Hardware Trojan, ARM9, FPGA, Design strategies, verify method
PDF Full Text Request
Related items