Electronics have become such a staple in modern life that we are just as a ected
by their vulnerabilities as they are. Ensuring that the processors that control them
are secure is paramount to our intellectual safety, our nancial safety, our privacy,
and even our personal safety. The market for integrated circuits is steadily being
consumed by a recon gurable type of processor known as a eld-programmable gate-
array (FPGA). The very features that make this type of device so successful also
make them susceptible to attack. FPGAs are recon gured by software; this makes it
easy for attackers to make modi cation. Such modi cations are known as hardware
trojans. There have been many techniques and strategies to ensure that these devices
are free from trojans but few have taken advantage of the central feature of these
devices. The con guration Bitstream is the binary le which programs these devices.
By extracting and analyzing it, a much more accurate and e cient means of detecting
trojans can be achieved. This discussion presents a new methodology for exploiting
the power of the con guration Bitstream to detect and described hardware trojans.
A software application is developed that automates this methodology. / Graduate / 0537 / 0544 / 0984 / nhoughto@uvic.ca
Identifer | oai:union.ndltd.org:uvic.ca/oai:dspace.library.uvic.ca:1828/7673 |
Date | 16 December 2016 |
Creators | Houghton, Nicholas |
Contributors | Gebali, Fayez, Moein, Samer |
Source Sets | University of Victoria |
Language | English, English |
Detected Language | English |
Type | Thesis |
Rights | Available to the World Wide Web |
Page generated in 0.0022 seconds