• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Ensuring Trust Of Third-Party Hardware Design With Constrained Sequential Equivalence Checking

Shrestha, Gyanendra 25 October 2012 (has links)
Globalization of semiconductor design and manufacturing has led to a concern of trust in the final product. The components may now be designed and manufactured from anywhere in the world without the direct supervision of the buyer. As a result, the hardware designs and fabricated chips may be vulnerable to malicious alterations by an adversary at any stage of VLSI design flow, thus compromising the integrity of the component. The effect of any modifications made by the adversary can be catastrophic in the critical applications. Because of the stealthy nature of such insertions, it is extremely difficult to detect them using traditional testing and verification methods. Therefore, the trust of the hardware systems require a new approach and have drawn much attention in the hardware security community. For many years, the researchers have developed sophisticated techniques to detect, isolate and prevent malicious attacks in cyber security community assuming that the underlying hardware platform is extremely secure and trustworthy. But the hardware may contain one or more backdoors that can be exploited by software at the time of operation. Therefore, the trust of the computing system cannot be guaranteed unless we can guarantee the trust of the hardware platform. A malicious insertion can be very stealthy and may only involve minor modification in the hardware design or the fabricated chip. The insertion may require rare or specific conditions in order to be activated. The effect may be denial of service, change of function, destruction of chip, leakage of secret information from cryptographic hardware etc. In this thesis, we propose a novel technique for the detection of malicious alteration(s) in a third party soft intellectual property (IP) using a clever combination of sequential equivalence checking (SEC) and automatic test generation. The use of powerful inductive invariants can prune a large illegal state space, and test generation helps to provide a sensitization path for nodes of interest. Results for a set of hard-to-verify designs show that our method can either ensure that the suspect design is free from the functional effect of any malicious change(s) or return a small group of most likely malicious signals. / Master of Science
2

[en] STRESS ANALISYS IN PIPES COMPOSED BY MITER BENDS / [pt] ANALISE DE TENSÕES EM TUBULAÇÕES COMPOSTAS POR CURVAS EM GOMOS

ARTHUR MARTINS BARBOSA BRAGA 06 April 2018 (has links)
[pt] Este trabalho procura apresentar e discutir, através do estudo de um caso especifico, alguns aspectos da análise de tensões em tubulações compostas por curvas em gomos. O problema estudado corresponde às condições de operação de um sistema que liga o reator a um vaso de pressão de uma planta de produção de ácido fosfórico. A elevada relação diâmetro/espessura deste duto impede que os procedimentos usuais do cálculo de flexibilidade de tubulações, baseados na teoria de vigas, sejam aplicados. Assim, foi utilizado o método dos elementos finitos através de elementos tipo casca. Esta análise numérica foi validada através de modelagens experimentais - extensometros elétricos e medidas de ovalização num modelo reduzido - e analitica - solução de Kitching. Foram também examinados os efeitos sobre o comportamento da tubulação devido aos flanges e diferentes condições de contorno impostas às suas extremidades. Alem disso, o procedimento de calculo sugerido pela norma ANSI/ASME foi discutido. / [en] The aim of this work is to present and discuss the structural behaviour of piping systems containning mitred bends. A duct that joins a reactor to a catch-all vessel of a phosporic acid production unit was studied under the thermal loads (in-plane) imposed during its operation. The pipe high diameter to thichness ratio makes unsuitable the approach of usual flexibility analysis (beam theory) so the finite element method was applied using shell elements. The finite element model was verified by an experimental analysis and by comparing results with those obtainned from a theoretical solution proposed by Kitching. The end effects due to flanges and the piping behaviour when different boundary conditions are imposed at its ends were studied. Also the ANSI/ASME standards for flexibility analysis were discussed.

Page generated in 0.032 seconds