Hardware Trojan vulnerability

dc.contributor.advisor Randall L. Geiger
dc.contributor.author Cao, Xing
dc.contributor.department Electrical and Computer Engineering
dc.date 2018-08-11T18:17:00.000
dc.date.accessioned 2020-06-30T02:58:11Z
dc.date.available 2020-06-30T02:58:11Z
dc.date.copyright Thu Jan 01 00:00:00 UTC 2015
dc.date.embargo 2001-01-01
dc.date.issued 2015-01-01
dc.description.abstract <p>Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single positive feedback loop. By example, it is shown that the presence of multiple equilibrium points can often be observed as hysteresis in a plot of an output circuit electrical variable versus temperature obtained from a bidirectional temperature sweep over a temperature interval [T_1,T_2] of interest. The hysteresis can be associated with a relationship comprised of a single continuous locus of points or comprised of two or more disjoint continuous loci of points. The concept of an “isolation region” that can occur in the temperature transfer characteristics of a circuit is discussed where an “isolation region” in the closed interval [T_1,T_2] is defined as any continuous locus of points in R2 that forms a closed path and that does not include either of the temperature interval endpoints, T_1 or T_2 . Challenges of determining the presence or absence of multiple stable equilibrium points with standard approaches to simulation and mixed-signal verification will be discussed. Vulnerability of circuits to analog hardware Trojans where the location and size of the hysteresis window can be engineered to serve as a Trojan trigger will be addressed. Concern associated with exploitation of an isolation region as a method for embedding and triggering analog hardware Trojans that are extremely difficult to detect will be raised.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/etd/14647/
dc.identifier.articleid 5654
dc.identifier.contextkey 8052006
dc.identifier.doi https://doi.org/10.31274/etd-180810-4200
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath etd/14647
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/28832
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/etd/14647/Cao_iastate_0097M_15138.pdf|||Fri Jan 14 20:23:59 UTC 2022
dc.subject.disciplines Electrical and Electronics
dc.subject.keywords Electrical Engineering
dc.subject.keywords Hardware Trojan
dc.subject.keywords Inverse Widlar
dc.subject.keywords Isolation Region
dc.subject.keywords Positive feedback loop
dc.subject.keywords Wilson Circuit
dc.title Hardware Trojan vulnerability
dc.type article
dc.type.genre thesis
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
thesis.degree.level thesis
thesis.degree.name Master of Science
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Cao_iastate_0097M_15138.pdf
Size:
1.42 MB
Format:
Adobe Portable Document Format
Description: