Thermal-aware FPGA design for behavioral IPs HW Trojans detection

Pao Yue-kong Library Electronic Theses Database

Thermal-aware FPGA design for behavioral IPs HW Trojans detection

 

Author: Li, Xiaotong
Title: Thermal-aware FPGA design for behavioral IPs HW Trojans detection
Degree: M.Sc.
Year: 2015
Subject: Hardware Trojans (Computers)
Computer security.
Hong Kong Polytechnic University -- Dissertations
Department: Dept. of Electronic and Information Engineering
Pages: 1 volume (various pagings) : illustrations ; 30 cm
Language: English
InnoPac Record: http://library.polyu.edu.hk/record=b2811057
URI: http://theses.lib.polyu.edu.hk/handle/200/8004
Abstract: One of the biggest advantages of C-Based VLSI design is its ability to automatically generate architectures with different trade-off s by only setting different synthesis options. This work uses this property to detect temperature-triggered HW Trojan in third party behavioral IPs (3PBIPs). A complete design flow is presented. It comprises two main phases: (1) At the first phase a design space explorer generates micro-architectures with different area vs. performance vs. power trade-offs automatically for the given behavioral IP. (2) The second phase maps three of these micro-architectures with different power problems to a reconfigurable computing board to create a 3-way redundant system. This system combined with a majority voter scheme is used to detect if a HW Trojan is present in the behavioral IP. Having different power profiles implies that each micro-architecture has a different thermal behavior and thus will trigger the HW Trojan at different time intervals. Therefore the outputs of the three designs are compared for discrepancies at regular intervals. Our method can therefore exactly pinpoint the trigger temperature of the HW Trojan. A case study of ADPCM is presented showing the effectiveness of our method.

Files in this item

Files Size Format
b28110572.pdf 6.462Mb PDF
Copyright Undertaking
As a bona fide Library user, I declare that:
  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

     

Quick Search

Browse

More Information