Font Size: a A A

Hardware Trojan Detection And Counter Measurements

Posted on:2017-12-16Degree:MasterType:Thesis
Country:ChinaCandidate:Ahmad Muhammad WaqasFull Text:PDF
GTID:2348330488988796Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
In the modern world of globalization, we are surrounded by electronic devices. Computer are interacting with physical environment and collecting valuable data and processing it with a marvelous speed. Integrated circuit(IC) are a crucial component of all these computing devices. Beside computing devices, a large amount of electronic devices microprocessor and in most of cases, the users are unaware of it. Up till now it was the software which was considered under the threat of malicious programs and hardware was assumed as safe, but the races between the attacker and the defenders leads the attacker to hide the attack as hidden as possible i.e. hardware level.In the era of globalization, Hardware Trojan is one of the emerging threat especially the offshore manufacturing of IC in untrusted foundries and weak links in the supply. A Trojan is a malicious logic which is usually hidden in the form of a use module and contains unwanted functionality which can be dangerous for our hardware system. A Trojan can either leak confidential information like password and account information or harm the system by increasing the power consumption. An attack on the hardware system totally differs from system because hardware is a physical entity so it altered in a limited minor without being able to detect and unlike software, it also cannot be altered. The three phases of hardware production, Design, fabrication and post-fabrication are vulnerable to Trojan insertion. So the best way to counter the insertion of malicious logic is to strictly control the whole process. A small design team of your trust, counting on your own built in tools. Further, take the design a trust worthy manufacturer, including trust worthy people in assembling the final product. But such a path of relying on your own built in tool and a team of trust is not possible.A lot of work had been performed in this field from securing the supply chain and its weak links so that the insertion of Trojan can be avoided to different methodologies in order to detect the malicious logic but all these research are decentralised and there is no common plateform to counter this threat.In the chapter one of our work had described the supply chain of the IC production and its weak links and proposed some solution so that we can avoid the Trojan insertion. In the next chapter we had proposed a texanomy for the Trojan and defined some parameters to classify the Trojan and on the basis of this texanomy we had performed a hardware emulation experiments and concluded its effects on our system. In the third chapter of our work we had took different Trojan detection techniques under consideration because a number of techniques are available and tried to summarise them. In the final chapter of our work we put different technique under the experiment and checked the results for the performance and consistency of these techniques and introduced some parameters to find a suitable technique according to our requirements and the technology domain of our IC because there is no magic bullet for the detection of hardware Trojan due to its structural complexity.In the end of our research work we had given a brief detail on the recent problems in this field and the future challenges and a list of future work regarding to this malicious threat.
Keywords/Search Tags:Design-For-Hardware-Trust(DFHT), Hardware Trojan Horse, Obfuscation, Structural Verification, Side-Channel Analysis
PDF Full Text Request
Related items