Survey on different hardware security challenges

With the globalization of integrated circuit design and fabrication process, the main concerning issue is of a malicious logic component, which can be intentionally embedded into a circuit during the manufacturing and fabrication processes. The malicious logic component can be referred to as h...

Full description

Saved in:
Bibliographic Details
Main Author: Chandani Devi Ramrup
Other Authors: Vivek Chaturvedi
Format: Final Year Project
Language:English
Published: 2018
Subjects:
Online Access:http://hdl.handle.net/10356/74364
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:With the globalization of integrated circuit design and fabrication process, the main concerning issue is of a malicious logic component, which can be intentionally embedded into a circuit during the manufacturing and fabrication processes. The malicious logic component can be referred to as hardware Trojan. It will leak the users’ confidential information out to the adversary, reduce the overall system performance and in the worst case, it may cause a fatal damage to the system. These vulnerabilities would cause serious impacts on the military system, hardware security, and many more. Over the years, there have been many different hardware security challenges, and various ways have been proposed to overcome said challenges. However, as hardware security is a vast topic, that is always evolving rapidly, many different threats, challenges and new proposed solutions are ever present. As such, this report will be focusing on identifying the different security problems existing in hardware security. This report will then show the two different types of suggested solutions and a comparison between the suggested solutions.