dc.creator | Reece, Trey | |
dc.date.accessioned | 2020-08-23T16:13:13Z | |
dc.date.available | 2014-12-05 | |
dc.date.issued | 2014-12-05 | |
dc.identifier.uri | https://etd.library.vanderbilt.edu/etd-12052014-031031 | |
dc.identifier.uri | http://hdl.handle.net/1803/15155 | |
dc.description.abstract | System security often focuses on the software, causing hardware security to be overlooked. Such oversight allows for attacks that can completely undermine the use of hardware as the root of trust. During the design of an integrated circuit, there are several opportunities for adversaries to make malicious modifications or insertions to a design. These attacks, known as hardware Trojans, can have catastrophic effects on a circuit if left undetected. This dissertation addresses Trojan impact, and proposes two low-cost detection methods for hardware Trojans inserted at different points in the production pipeline, namely: (1) Trojans hidden within third-party intellectual property (IP) licensed from a vendor, and (2) Trojans inserted during the fabrication steps taking place at external fabrication plants.
Determining whether third-party IP does only its intended function and nothing else is a major challenge. Through comparison of two similar but untrusted designs using design unrolling and Boolean satisfiability, functional differences can be identified for all possible input combinations within a window of time. This technique was tested on multiple Trojan benchmarks and demonstrated effective and accurate detectability.
Process variation poses the greatest obstacle to detecting Trojans in chips. In order to detect Trojans inserted during fabrication, a digital model is created. This model can then be trained using the fabricated chip to account for different parameters, such as process variation. The parameters of the trained model can be used to identify suspicious areas of the chip. Furthermore, this process does not require expensive test equipment, nor does it require a costly golden, trusted chip for comparison. | |
dc.format.mimetype | application/pdf | |
dc.subject | integrated circuit design | |
dc.subject | vlsi | |
dc.subject | hardware trojan | |
dc.subject | hardware security | |
dc.subject | verification | |
dc.title | Assessing and Detecting Malicious Hardware in Integrated Circuits | |
dc.type | dissertation | |
dc.contributor.committeeMember | Thomas Daniel Loveless | |
dc.contributor.committeeMember | Bradley A. Malin | |
dc.contributor.committeeMember | Bharat L. Bhuva | |
dc.contributor.committeeMember | Gabor Karsai | |
dc.type.material | text | |
thesis.degree.name | PHD | |
thesis.degree.level | dissertation | |
thesis.degree.discipline | Electrical Engineering | |
thesis.degree.grantor | Vanderbilt University | |
local.embargo.terms | 2014-12-05 | |
local.embargo.lift | 2014-12-05 | |
dc.contributor.committeeChair | William H. Robinson | |