Survey on different hardware security challenges
With the globalization of integrated circuit design and fabrication process, the main concerning issue is of a malicious logic component, which can be intentionally embedded into a circuit during the manufacturing and fabrication processes. The malicious logic component can be referred to as h...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/74364 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-74364 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-743642023-03-03T20:33:48Z Survey on different hardware security challenges Chandani Devi Ramrup Vivek Chaturvedi School of Computer Science and Engineering DRNTU::Engineering With the globalization of integrated circuit design and fabrication process, the main concerning issue is of a malicious logic component, which can be intentionally embedded into a circuit during the manufacturing and fabrication processes. The malicious logic component can be referred to as hardware Trojan. It will leak the users’ confidential information out to the adversary, reduce the overall system performance and in the worst case, it may cause a fatal damage to the system. These vulnerabilities would cause serious impacts on the military system, hardware security, and many more. Over the years, there have been many different hardware security challenges, and various ways have been proposed to overcome said challenges. However, as hardware security is a vast topic, that is always evolving rapidly, many different threats, challenges and new proposed solutions are ever present. As such, this report will be focusing on identifying the different security problems existing in hardware security. This report will then show the two different types of suggested solutions and a comparison between the suggested solutions. Bachelor of Engineering (Computer Science) 2018-05-16T12:10:04Z 2018-05-16T12:10:04Z 2018 Final Year Project (FYP) http://hdl.handle.net/10356/74364 en Nanyang Technological University 26 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering |
spellingShingle |
DRNTU::Engineering Chandani Devi Ramrup Survey on different hardware security challenges |
description |
With the globalization of integrated circuit design and fabrication process, the main concerning
issue is of a malicious logic component, which can be intentionally embedded into a circuit
during the manufacturing and fabrication processes. The malicious logic component can be
referred to as hardware Trojan. It will leak the users’ confidential information out to the
adversary, reduce the overall system performance and in the worst case, it may cause a fatal
damage to the system. These vulnerabilities would cause serious impacts on the military
system, hardware security, and many more.
Over the years, there have been many different hardware security challenges, and various ways
have been proposed to overcome said challenges. However, as hardware security is a vast topic,
that is always evolving rapidly, many different threats, challenges and new proposed solutions
are ever present. As such, this report will be focusing on identifying the different security
problems existing in hardware security. This report will then show the two different types of
suggested solutions and a comparison between the suggested solutions. |
author2 |
Vivek Chaturvedi |
author_facet |
Vivek Chaturvedi Chandani Devi Ramrup |
format |
Final Year Project |
author |
Chandani Devi Ramrup |
author_sort |
Chandani Devi Ramrup |
title |
Survey on different hardware security challenges |
title_short |
Survey on different hardware security challenges |
title_full |
Survey on different hardware security challenges |
title_fullStr |
Survey on different hardware security challenges |
title_full_unstemmed |
Survey on different hardware security challenges |
title_sort |
survey on different hardware security challenges |
publishDate |
2018 |
url |
http://hdl.handle.net/10356/74364 |
_version_ |
1759853530704773120 |