語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Hardware Trojans in Wireless Cryptog...
~
ProQuest Information and Learning Co.
Hardware Trojans in Wireless Cryptographic ICs.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Hardware Trojans in Wireless Cryptographic ICs./
作者:
Liu, Yu.
面頁冊數:
1 online resource (118 pages)
附註:
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: B.
標題:
Electrical engineering. -
電子資源:
click for full text (PQDT)
ISBN:
9780355392555
Hardware Trojans in Wireless Cryptographic ICs.
Liu, Yu.
Hardware Trojans in Wireless Cryptographic ICs.
- 1 online resource (118 pages)
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: B.
Thesis (Ph.D.)--The University of Texas at Dallas, 2017.
Includes bibliographical references
Over the last decade, the problem of hardware Trojans in manufactured integrated circuits (ICs) has been a topic of intense investigation by academic researchers and governmental entities. Hardware Trojans are malicious modifications introduced in a manufactured IC, which can be exploited by a knowledgeable adversary to cause incorrect results, steal sensitive data, or even incapacitate a chip. Given the sensitive nature of applications wherein hardware Trojan-infested ICs may be deployed, developing detection methodologies has become paramount. Indeed, traditional test methods fall short in revealing hardware Trojans, as they are geared towards identifying modeled defects and, therefore, cannot reveal unmodeled malicious inclusions.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355392555Subjects--Topical Terms:
596380
Electrical engineering.
Index Terms--Genre/Form:
554714
Electronic books.
Hardware Trojans in Wireless Cryptographic ICs.
LDR
:03296ntm a2200325K 4500
001
914010
005
20180628100933.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355392555
035
$a
(MiAaPQ)AAI10675234
035
$a
(MiAaPQ)0382vireo:184Liu
035
$a
AAI10675234
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Liu, Yu.
$3
1180828
245
1 0
$a
Hardware Trojans in Wireless Cryptographic ICs.
264
0
$c
2017
300
$a
1 online resource (118 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: B.
500
$a
Adviser: Yiorgos Makris.
502
$a
Thesis (Ph.D.)--The University of Texas at Dallas, 2017.
504
$a
Includes bibliographical references
520
$a
Over the last decade, the problem of hardware Trojans in manufactured integrated circuits (ICs) has been a topic of intense investigation by academic researchers and governmental entities. Hardware Trojans are malicious modifications introduced in a manufactured IC, which can be exploited by a knowledgeable adversary to cause incorrect results, steal sensitive data, or even incapacitate a chip. Given the sensitive nature of applications wherein hardware Trojan-infested ICs may be deployed, developing detection methodologies has become paramount. Indeed, traditional test methods fall short in revealing hardware Trojans, as they are geared towards identifying modeled defects and, therefore, cannot reveal unmodeled malicious inclusions.
520
$a
Various hardware Trojan detection methods have been proposed, most of them targeted digital circuits. As pointed out therein, the Analog/RF domain is an attractive attack target, since the wireless communication of these chips with the environment over public channels simplifies the process of staging an attack without obtaining physical access to the I/O of the chip. On the other hand, signals in an Analog/RF IC are continuous and highly-correlated to one another; hence, the likelihood of a modification disturbing these correlations is very high. Therefore, this dissertation outlines the problems and proposes three solutions to ensure trustworthiness of Analog/RF ICs: namely, i) Utilize statistical side channel fingerprinting to detect hardware Trojan in Analog/RF ICs. ii) Propose to use a combination of a trusted simulation model, measurements from process control monitors (PCMs), that are typically present either on die or on wafer kerf, and advanced statistical tail modeling techniques to detect hardware Trojan without relying on golden chips. iii) Introduce a concurrent hardware Trojan detection (CHTD) methodology for wireless cryptographic integrated circuits (ICs), based on continuous extraction of a side-channel fingerprint and evaluation by a trained on-chip neural classifier. All methods proposed in this dissertation have been verified with measurements from actual silicon chips.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Electrical engineering.
$3
596380
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0544
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
The University of Texas at Dallas.
$b
Electrical Engineering.
$3
1181534
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10675234
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入