首页> 外文学位 >Trusted Integrated Circuits.
【24h】

Trusted Integrated Circuits.

机译:受信任的集成电路。

获取原文
获取原文并翻译 | 示例

摘要

The problem of maliciously intended modifications in hardware intellectual property (IP) and manufactured integrated circuits (ICs), commonly known as hardware Trojans, has recently garnered interest not only in academia but also in governmental agencies and industry. Partly because of design outsourcing and migration of fabrication to low-cost areas across the globe, and partly because of increased reliance on third-party intellectual property and design automation software, the integrated circuit supply chain is now considered far more vulnerable to malicious modifications than ever before. Such modifications, known as hardware Trojans, provide additional functionality that is unknown to the designer and user, but which can be exploited by the perpetrator after deployment to sabotage or incapacitate a chip, or to steal sensitive information.;This thesis outlines the challenges and elucidates the research opportunities associated with certifying trustworthiness of integrated circuits. Four solutions developed by the author for various instances of the problem will be discussed which include i) the use of side-channel information along with statistical analysis methods to detect hardware Trojans in digital circuits. ii) Hardware Trojan detection in wireless cryptographic ICs. A wireless cryptographic chip along with its Trojan-infected variants are currently being fabricated to demonstrate the effectiveness of the proposed method using actual silicon measurements. iii) The use of on-chip neural networks for post-deployment trust monitoring. A general trust evaluation architecture is proposed to harden original circuits with on-chip classifier and on-chip measurement acquisition sensors. iv) A novel third-party hardware IP acquisition and delivery protocol facilitating IP core trustworthiness evaluation based on proof-carrying code (PCC) concepts.
机译:恶意地修改硬件知识产权(IP)和制造的集成电路(IC)(通常称为硬件木马)的问题最近引起了学术界以及政府机构和行业的关注。部分原因是设计外包并将制造转移到全球的低成本地区,部分原因是对第三方知识产权和设计自动化软件的依赖增加,因此,集成电路供应链现在被认为比恶意修改要容易得多。以往。这种被称为硬件木马的修改提供了设计者和用户未知的附加功能,但在部署之后,作案者可以利用这些附加功能来破坏或破坏芯片,或窃取敏感信息。阐明了与证明集成电路的可信度相关的研究机会。将讨论作者针对问题的各种情况开发的四个解决方案,其中包括:i)使用边信道信息以及统计分析方法来检测数字电路中的硬件木马。 ii)无线密码IC中的硬件木马检测。目前正在制造一种无线密码芯片及其受特洛伊木马病毒感染的变体,以通过实际的硅测量来证明所提出方法的有效性。 iii)使用片上神经网络进行部署后信任监控。提出了一种通用的信任评估架构,以利用片上分类器和片上测量采集传感器来强化原始电路。 iv)一种新颖的第三方硬件IP获取和交付协议,可基于承载代码(PCC)概念促进IP内核可信度评估。

著录项

  • 作者

    Jin, Yier.;

  • 作者单位

    Yale University.;

  • 授予单位 Yale University.;
  • 学科 Engineering Computer.;Engineering Electronics and Electrical.
  • 学位 Ph.D.
  • 年度 2012
  • 页码 140 p.
  • 总页数 140
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号