Automated trojan detection and analysis in field programmable gate arraysa
Electronics have become such a staple in modern life that we are just as a ected by their vulnerabilities as they are. Ensuring that the processors that control them are secure is paramount to our intellectual safety, our nancial safety, our privacy, and even our personal safety. The market for...
Main Author: | |
---|---|
Other Authors: | |
Language: | English en |
Published: |
2016
|
Subjects: | |
Online Access: | http://hdl.handle.net/1828/7673 |
id |
ndltd-uvic.ca-oai-dspace.library.uvic.ca-1828-7673 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-uvic.ca-oai-dspace.library.uvic.ca-1828-76732016-12-18T17:02:14Z Automated trojan detection and analysis in field programmable gate arraysa Houghton, Nicholas Gebali, Fayez Moein, Samer Trojan Hardware Security FPGA Detection Analysis Java Automated Electronics have become such a staple in modern life that we are just as a ected by their vulnerabilities as they are. Ensuring that the processors that control them are secure is paramount to our intellectual safety, our nancial safety, our privacy, and even our personal safety. The market for integrated circuits is steadily being consumed by a recon gurable type of processor known as a eld-programmable gate- array (FPGA). The very features that make this type of device so successful also make them susceptible to attack. FPGAs are recon gured by software; this makes it easy for attackers to make modi cation. Such modi cations are known as hardware trojans. There have been many techniques and strategies to ensure that these devices are free from trojans but few have taken advantage of the central feature of these devices. The con guration Bitstream is the binary le which programs these devices. By extracting and analyzing it, a much more accurate and e cient means of detecting trojans can be achieved. This discussion presents a new methodology for exploiting the power of the con guration Bitstream to detect and described hardware trojans. A software application is developed that automates this methodology. Graduate 0537 0544 0984 nhoughto@uvic.ca 2016-12-16T23:04:23Z 2016-12-16T23:04:23Z 2016 2016-12-16 Thesis http://hdl.handle.net/1828/7673 English en Available to the World Wide Web |
collection |
NDLTD |
language |
English en |
sources |
NDLTD |
topic |
Trojan Hardware Security FPGA Detection Analysis Java Automated |
spellingShingle |
Trojan Hardware Security FPGA Detection Analysis Java Automated Houghton, Nicholas Automated trojan detection and analysis in field programmable gate arraysa |
description |
Electronics have become such a staple in modern life that we are just as a ected
by their vulnerabilities as they are. Ensuring that the processors that control them
are secure is paramount to our intellectual safety, our nancial safety, our privacy,
and even our personal safety. The market for integrated circuits is steadily being
consumed by a recon gurable type of processor known as a eld-programmable gate-
array (FPGA). The very features that make this type of device so successful also
make them susceptible to attack. FPGAs are recon gured by software; this makes it
easy for attackers to make modi cation. Such modi cations are known as hardware
trojans. There have been many techniques and strategies to ensure that these devices
are free from trojans but few have taken advantage of the central feature of these
devices. The con guration Bitstream is the binary le which programs these devices.
By extracting and analyzing it, a much more accurate and e cient means of detecting
trojans can be achieved. This discussion presents a new methodology for exploiting
the power of the con guration Bitstream to detect and described hardware trojans.
A software application is developed that automates this methodology. === Graduate === 0537 === 0544 === 0984 === nhoughto@uvic.ca |
author2 |
Gebali, Fayez |
author_facet |
Gebali, Fayez Houghton, Nicholas |
author |
Houghton, Nicholas |
author_sort |
Houghton, Nicholas |
title |
Automated trojan detection and analysis in field programmable gate arraysa |
title_short |
Automated trojan detection and analysis in field programmable gate arraysa |
title_full |
Automated trojan detection and analysis in field programmable gate arraysa |
title_fullStr |
Automated trojan detection and analysis in field programmable gate arraysa |
title_full_unstemmed |
Automated trojan detection and analysis in field programmable gate arraysa |
title_sort |
automated trojan detection and analysis in field programmable gate arraysa |
publishDate |
2016 |
url |
http://hdl.handle.net/1828/7673 |
work_keys_str_mv |
AT houghtonnicholas automatedtrojandetectionandanalysisinfieldprogrammablegatearraysa |
_version_ |
1718401419357192192 |