A computer scientist’s evaluation of publically available hardware Trojan benchmarks

Loading...
Thumbnail Image
Authors
Slayback, Scott M.
Subjects
building security in
design for trust
hardware intellectual property cores
Hardware Oriented Security and Trust
hardware synthesis
hardware Trojans
HDL
inherently trustworthy systems
malicious hardware
reconfigurable hardware
secure interfaces
security education
trustworthy system development
Vivado 15.NUMBER OFPAGES 165
Advisors
Huffmire, Theodore
Date of Issue
2015-09
Date
Sep-15
Publisher
Monterey, California: Naval Postgraduate School
Language
Abstract
Dr. Hassan Salmani and Dr. Mohammed Tehranipoor have developed a collection of publically available hardware Trojans, meant to be used as common benchmarks for the analysis of detection and mitigation techniques. In this thesis, we evaluate a selection of these Trojans from the perspective of a computer scientist with limited electrical engineering background. Note that this thesis is also intended to serve as a supplement to the existing documentation, since it provides a thorough description of each benchmark. This description presents a detailed analysis of each Trojan’s activation conditions and post-activation activity. In addition, we describe the difficulties we encountered in synthesizing and simulating each Trojan, and, where possible, provide solutions to those difficulties.
Type
Thesis
Description
Series/Report No
Department
Computer Science
Computer Science
Organization
Identifiers
NPS Report Number
Sponsors
Funder
Format
Citation
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
Copyright is reserved by the copyright owner.
Collections