Loading...

Trustworthiness Improvement of Integrated Circuits against Hardware Trojans

Farajipour Ghohroud, Najmeh | 2018

591 Viewed
  1. Type of Document: Ph.D. Dissertation
  2. Language: Farsi
  3. Document No: 50845 (19)
  4. University: Sharif University of Technology
  5. Department: Computer Engineering
  6. Advisor(s): Hessabi, Shaahin
  7. Abstract:
  8. Most hardware manufacturers outsource the fabrication of their integrated circuits (ICs) to third party foundries in order to reduce the cost of silicon chip fabrication. This increases the vulnerability to malicious activities. Third party foundries may modify the circuit’s design or its physical parameters. These modifications are known as Hardware Trojan Horses (HTHs). An adversary can insert a Trojan in the design to disable and/or destroy a system, or leak information to the adversary. Several Methods are proposed for HTH Detection, and Design for Hardware Trust (DfHT) in the last decade. However, the lack of a comprehensive approach in this area is sensed. Moreover, the previously proposed methods impose heavy area or performance overheads.In this thesis, we proposed HTH detection methods which have the least possible overheads, while covering most of the possible Trojans. The main goal in this thesis is to improve controllability and observability of all nodes in the circuit to facilitate HTH detection in all parts of the circuit.In this research, in order to meet the shortcomings of previous research, four areas of research are investigated: 1) HTH detection after chip fabrication, 2) HTH detection before chip fabrication, 3) proposing DfHT methods for high level circuit description to facilitate HTH detection, and 4) proposing a metric for analyzing the vulnerability of circuits to HTH for high level designs. In this thesis, we investigate the effect of laser-induced fault injection on a circuit which is suspicious to Trojan. We show that fault injection can improve the controllability of hard to control nodes in the circuit, and improves HTH detectability by up to 97% without any area overhead. Afterwards, we propose a bio-inspired method for HTH detection before chip fabrication. Using this method we can achieve up to 100% HTH detectability with very low area overhead. Also, we propose three DfHT methods to facilitate HTH detection at behavioral level, which improve the average controllability of design variables by up to four times and increase the HTH detectability by up to five times. This improvement is achieved at the cost of an insignificant increase in area overhead, which is less than 0.52% in simulation results. The metric, which is used for circuit vulnerability analysis to HTH in this thesis, is based on distribution analysis of variables’ controllabilities and observabilities. This metric has a high degree of consistency with the metrics presented at gate level, and is therefore suitable for comparing DfHT methods at behavioral level
  9. Keywords:
  10. Trojon Detection ; Hardware Secunity ; Hardware Trust ; Hardware Trojan Detection

 Digital Object List

 Bookmark

No TOC