Survey on different hardware security challenges
With the globalization of integrated circuit design and fabrication process, the main concerning issue is of a malicious logic component, which can be intentionally embedded into a circuit during the manufacturing and fabrication processes. The malicious logic component can be referred to as h...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/74364 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | With the globalization of integrated circuit design and fabrication process, the main concerning
issue is of a malicious logic component, which can be intentionally embedded into a circuit
during the manufacturing and fabrication processes. The malicious logic component can be
referred to as hardware Trojan. It will leak the users’ confidential information out to the
adversary, reduce the overall system performance and in the worst case, it may cause a fatal
damage to the system. These vulnerabilities would cause serious impacts on the military
system, hardware security, and many more.
Over the years, there have been many different hardware security challenges, and various ways
have been proposed to overcome said challenges. However, as hardware security is a vast topic,
that is always evolving rapidly, many different threats, challenges and new proposed solutions
are ever present. As such, this report will be focusing on identifying the different security
problems existing in hardware security. This report will then show the two different types of
suggested solutions and a comparison between the suggested solutions. |
---|