首页> 外文学位 >Ring Oscillator Based Hardware Trojan Detection.
【24h】

Ring Oscillator Based Hardware Trojan Detection.

机译:基于环形振荡器的硬件木马检测。

获取原文
获取原文并翻译 | 示例

摘要

Hardware Trojans are malicious circuits which can be secretly implanted in integrated circuits by unscrupulous third party manufacturers for the purpose of spying or stealing information from the circuit. This has become a matter of concern with the increase in outsourcing of semiconductors which are used both in military and commercial sectors. It has been observed that due to the presence of process variation, environmental variation, and measurement noise; a stealthy Trojan may go undetected. In the first part of this thesis, we study the NOT and NAND based ring oscillators (ROs) as power monitors for detecting these Trojans. A network comprising of 7 ROs is implemented using the ISCAS85 c2670 benchmark on several Xilinx Spartan-3E FPGAs. The results demonstrate that the impact of Trojans on the frequency of nearby ROs is noticeably larger for NAND based structure compared to the NOT one, thus making the NAND based design more attractive for the detection of Trojans.;In the later part of our work, a circuit partitioning based approach is proposed which facilitates the detection of Trojans. The ratio of the power consumed by the Trojan to the power consumed by the host circuit plays a vital role in detection of Trojans using any power based side channel analysis method. Partitioning the circuit allows us to control the switching activity of the divided areas independently. Therefore, for a chip with uniform switching activity across the chip area, overall dynamic power consumption can be reduced to almost 1/n of the total dynamic power, if the chip is divided into n number of partitions. In this work, the circuit under authentication (CUA) is split into two sub circuits and the ring oscillators frequency values are observed while keeping one of the two sub circuits inactive. Experimental results show a higher percentage of change in the ring oscillators frequencies during the partial activation of CUA which magnifies the discrepancy between the Trojan free and Trojan inserted circuits.
机译:硬件木马是恶意电路,可以由不道德的第三方制造商秘密植入集成电路中,以监视或窃取电路中的信息。随着用于军事和商业领域的半导体外包的增加,这已成为令人关注的问题。已经观察到由于工艺变化,环境变化和测量噪声的存在;一个秘密的特洛伊木马可能不会被发现。在本文的第一部分,我们研究了基于NOT和NAND的环形振荡器(RO)作为检测这些木马的功率监控器。通过在多个Xilinx Spartan-3E FPGA上使用ISCAS85 c2670基准测试来实现由7个RO组成的网络。结果表明,与基于NOT的结构相比,基于NAND的结构木马对附近RO的频率影响显着更大,从而使基于NAND的设计对木马的检测更具吸引力。提出了一种基于电路分区的方法,该方法有助于检测木马。木马消耗的功率与主机电路消耗的功率之比在使用任何基于功率的边信道分析方法检测木马中起着至关重要的作用。对电路进行分区允许我们独立地控制划分区域的开关活动。因此,对于在整个芯片区域具有均匀开关活动的芯片,如果将芯片划分为n个分区,则总动态功耗可以降低到总动态功耗的近1 / n。在这项工作中,将认证电路(CUA)分为两个子电路,并在保持两个子电路之一不活动的同时观察环形振荡器的频率值。实验结果表明,在CUA的部分激活过程中,环形振荡器频率的变化百分比更高,这放大了Trojan free和Trojan插入电路之间的差异。

著录项

  • 作者

    Hoque, Tamzidul.;

  • 作者单位

    The University of Toledo.;

  • 授予单位 The University of Toledo.;
  • 学科 Electrical engineering.;Computer engineering.
  • 学位 M.S.
  • 年度 2015
  • 页码 89 p.
  • 总页数 89
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号