Automated trojan detection and analysis in field programmable gate arraysa

Electronics have become such a staple in modern life that we are just as a ected by their vulnerabilities as they are. Ensuring that the processors that control them are secure is paramount to our intellectual safety, our nancial safety, our privacy, and even our personal safety. The market for...

Full description

Bibliographic Details
Main Author: Houghton, Nicholas
Other Authors: Gebali, Fayez
Language:English
en
Published: 2016
Subjects:
Online Access:http://hdl.handle.net/1828/7673
id ndltd-uvic.ca-oai-dspace.library.uvic.ca-1828-7673
record_format oai_dc
spelling ndltd-uvic.ca-oai-dspace.library.uvic.ca-1828-76732016-12-18T17:02:14Z Automated trojan detection and analysis in field programmable gate arraysa Houghton, Nicholas Gebali, Fayez Moein, Samer Trojan Hardware Security FPGA Detection Analysis Java Automated Electronics have become such a staple in modern life that we are just as a ected by their vulnerabilities as they are. Ensuring that the processors that control them are secure is paramount to our intellectual safety, our nancial safety, our privacy, and even our personal safety. The market for integrated circuits is steadily being consumed by a recon gurable type of processor known as a eld-programmable gate- array (FPGA). The very features that make this type of device so successful also make them susceptible to attack. FPGAs are recon gured by software; this makes it easy for attackers to make modi cation. Such modi cations are known as hardware trojans. There have been many techniques and strategies to ensure that these devices are free from trojans but few have taken advantage of the central feature of these devices. The con guration Bitstream is the binary le which programs these devices. By extracting and analyzing it, a much more accurate and e cient means of detecting trojans can be achieved. This discussion presents a new methodology for exploiting the power of the con guration Bitstream to detect and described hardware trojans. A software application is developed that automates this methodology. Graduate 0537 0544 0984 nhoughto@uvic.ca 2016-12-16T23:04:23Z 2016-12-16T23:04:23Z 2016 2016-12-16 Thesis http://hdl.handle.net/1828/7673 English en Available to the World Wide Web
collection NDLTD
language English
en
sources NDLTD
topic Trojan
Hardware
Security
FPGA
Detection
Analysis
Java
Automated
spellingShingle Trojan
Hardware
Security
FPGA
Detection
Analysis
Java
Automated
Houghton, Nicholas
Automated trojan detection and analysis in field programmable gate arraysa
description Electronics have become such a staple in modern life that we are just as a ected by their vulnerabilities as they are. Ensuring that the processors that control them are secure is paramount to our intellectual safety, our nancial safety, our privacy, and even our personal safety. The market for integrated circuits is steadily being consumed by a recon gurable type of processor known as a eld-programmable gate- array (FPGA). The very features that make this type of device so successful also make them susceptible to attack. FPGAs are recon gured by software; this makes it easy for attackers to make modi cation. Such modi cations are known as hardware trojans. There have been many techniques and strategies to ensure that these devices are free from trojans but few have taken advantage of the central feature of these devices. The con guration Bitstream is the binary le which programs these devices. By extracting and analyzing it, a much more accurate and e cient means of detecting trojans can be achieved. This discussion presents a new methodology for exploiting the power of the con guration Bitstream to detect and described hardware trojans. A software application is developed that automates this methodology. === Graduate === 0537 === 0544 === 0984 === nhoughto@uvic.ca
author2 Gebali, Fayez
author_facet Gebali, Fayez
Houghton, Nicholas
author Houghton, Nicholas
author_sort Houghton, Nicholas
title Automated trojan detection and analysis in field programmable gate arraysa
title_short Automated trojan detection and analysis in field programmable gate arraysa
title_full Automated trojan detection and analysis in field programmable gate arraysa
title_fullStr Automated trojan detection and analysis in field programmable gate arraysa
title_full_unstemmed Automated trojan detection and analysis in field programmable gate arraysa
title_sort automated trojan detection and analysis in field programmable gate arraysa
publishDate 2016
url http://hdl.handle.net/1828/7673
work_keys_str_mv AT houghtonnicholas automatedtrojandetectionandanalysisinfieldprogrammablegatearraysa
_version_ 1718401419357192192