Font Size: a A A

Hardware Trojan Detection-strategies And Designs

Posted on:2022-07-07Degree:MasterType:Thesis
Country:ChinaCandidate:G F LiuFull Text:PDF
GTID:2518306728966279Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
Hardware Trojan is a typical problem of hardware security,and it is very destructive.These Trojans may cause leakage of information or ineffectiveness of the circuit.With the IP cores,transistors,the designing process and manufacturing process being more complex,hardware Trojans is much harder to detect.Considering the implementation and detection of hardware Trojans is a game process,this thesis has proposed a detection strategy combining multiple detection methods based on the existing Trojan horse mechanism with detection methods,and has also designed a system in order to realize the strategy.There are four aspects in this thesis:First,by analyzing the characteristics,classification and detection methods of hardware Trojans' existence,the thesis proposes three lines of defense against hardware Trojans.Second,according to the characteristics of the hardware Trojans which have been manufactured,a database model of hardware Trojan has been designed in this thesis.Third,according to the overall design of the hardware Trojans detection system and the database,a detection process of the detection system is designed based on the decision theory.Fourth,the detection system of hardware Trojans is modeled based on a multiagent simulation model and implemented in Netlogo.The results show that during the preliminary test,which is first part of the strategy,when the Trojans hide defects caused by process deviations and the production process,the detection accuracy of the hardware Trojans will be greatly reduced.And if the threshold for the system to judge the Trojans is changed,several circuits that do not contain Trojan horses will be mistakenly judged as hardware Trojan horses.During the detailed test,which is the second part of the strategy,as the required detection accuracy increases,the hardware Trojan detection process will become more complex.
Keywords/Search Tags:Hardware Trojan, Database, Decision Theory, Multi-agent Simulation
PDF Full Text Request
Related items