Analog hardware security and hardware authentication

dc.contributor.advisor Randall Geiger
dc.contributor.author Wang, Qianqian
dc.contributor.department Department of Electrical and Computer Engineering
dc.date 2019-12-10T20:48:52.000
dc.date.accessioned 2020-06-30T03:17:47Z
dc.date.available 2020-06-30T03:17:47Z
dc.date.copyright Wed Aug 01 00:00:00 UTC 2018
dc.date.embargo 2019-07-19
dc.date.issued 2018-01-01
dc.description.abstract <p>Hardware security and hardware authentication have become more and more important concerns in the manufacture of trusted integrated circuits. In this dissertation, a detailed study of hardware Trojans in analog circuits characterized by the presence of extra operating points or modes is presented. In a related study, a counterfeit countermeasure method based upon PUF authentication circuits is proposed for addressing the growing proliferation of counterfeit integrated circuits in the supply chain.</p> <p>Most concerns about hardware Trojans in semiconductor devices are based upon an implicit assumption that attackers will focus on embedding Trojans in digital hardware by making malicious modifications to the Boolean operation of a circuit. In stark contrast, hardware Trojans can be easily embedded in some of the most basic analog circuits. In this work, a particularly insidious class of analog hardware Trojans that require no architectural modifications, no area or power overhead, and prior to triggering, that leave no signatures in any power domains or delay paths is introduced. The Power/Architecture/Area/Signature Transparent (PAAST) characteristics help the Trojan “hide” and make them very difficult to detect with existing hardware Trojan detection methods. Cleverly hidden PAAST Trojans are nearly impossible to detect with the best simulation and verification tools, even if a full and accurate disclosure of the circuit schematic and layout is available. Aside from the work of the author of this dissertation and her classmates, the literature is void of discussions of PAAST analog hardware Trojans. In this work, examples of circuits showing the existence of PAAST analog hardware Trojans are given, the PAAST characteristics of these types of hardware Trojans are discussed, and heuristic detection methods that can help to detect these analog hardware Trojans are proposed.</p> <p>Another major and growing problem in the modern IC supply chain is the proliferation of counterfeit chips that are often characterized by different or inferior performance characteristics and reduced reliability when compared with authentic parts. A counterfeit countermeasure method is proposed that should lower the entry barrier for major suppliers of commercial off the shelf (COTS) parts to offer authenticated components to the military and other customers that have high component reliability requirements. The countermeasure is based upon a PUF authentication circuit that requires no area, pin, or power overhead, and causes no degradation of performance of existing and future COTS components.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/etd/17350/
dc.identifier.articleid 8357
dc.identifier.contextkey 15016775
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath etd/17350
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/31533
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/etd/17350/Wang_iastate_0097E_17455.pdf|||Fri Jan 14 21:21:04 UTC 2022
dc.subject.disciplines Computer Engineering
dc.subject.disciplines Electrical and Electronics
dc.subject.keywords analog Trojan
dc.subject.keywords hardware authentication
dc.subject.keywords hardware security
dc.subject.keywords multiple equilibriums
dc.subject.keywords Trojan detection
dc.title Analog hardware security and hardware authentication
dc.type dissertation
dc.type.genre dissertation
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
thesis.degree.discipline Computer Engineering
thesis.degree.level dissertation
thesis.degree.name Doctor of Philosophy
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Wang_iastate_0097E_17455.pdf
Size:
4.79 MB
Format:
Adobe Portable Document Format
Description: