hh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Securing Modern Integrated Circuits Against Hardware Trojans Using Thermal Profiling: Assessing the Security Implications of Process Miniaturization
Halmstad University, School of Information Technology.
Halmstad University, School of Information Technology.
2024 (English)Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

The everlasting pursuit of process miniaturization causes inherent security vulnerabilities, as the increasing complexity of Integrated Circuit (IC) manufacturing forces companies to outsource production, exposing ICs to unauthorized modifications, commonly referred to as Hardware Trojans (HTs). The outsourcing allows adversaries to gather detailed IC information, which may be leveraged for malicious intents using HTs. An additional side-effect of process miniaturization is increasing Process Variation (PV) levels, creating non-deterministic attributes in modern ICs technologies, allowing the concealment of HTs. While numerous successful HT detection techniques utilizing Side-Channel Analysis (SCA) and on-chip temperature sensors have been proposed in contemporary research, such methods often assume the complete integrity of sensor data, rendering them susceptible to HTs manipulating the data used in detection decisions. Recent research has introduced a HT that manipulates temperature sensor data, potentially enabling the launch of Performance Degradation (PD) attacks. However, this study overlooks PV and sensor noise, limiting opportunities to mask HT behavior. This thesis explores the security implications of aggressive process miniaturization by attempting to mask HT attacks within the inherited side-effects. To explore this theory, two proposed HTs are designed and simulated using Core and Memory interval Thermal (CoMeT), demonstrating a 63%-73% PD while remaining indistinguishable from Trojan Free (TF) ICs across multiple HT detection methods.

Place, publisher, year, edition, pages
2024. , p. 88
Keywords [en]
Integrated Circuits, Data, Hardware, Security, Hardware Security, Trojan, Hardware Trojan, Sensor, Processor, CPU, Attack
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:hh:diva-54400OAI: oai:DiVA.org:hh-54400DiVA, id: diva2:1887974
Subject / course
Computer science and engineering
Educational program
Computer Science and Engineering, 300 credits
Presentation
2024-05-29, R4147, Kristian IV:s väg 3, Halmstad, 13:29 (English)
Supervisors
Examiners
Available from: 2024-08-12 Created: 2024-08-10 Last updated: 2024-08-12Bibliographically approved

Open Access in DiVA

fulltext(2561 kB)186 downloads
File information
File name FULLTEXT02.pdfFile size 2561 kBChecksum SHA-512
19c2be534cf9439652efeca0d1b2b8fbf381dfa49873a37ff06646f1b581f23c0618e160a7b96c6ba2cd7d299a0fcb0d0d0538389c328dff2ab3c20006f5905a
Type fulltextMimetype application/pdf

By organisation
School of Information Technology
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 186 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 529 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf