Survey on different hardware security challenges

With the globalization of integrated circuit design and fabrication process, the main concerning issue is of a malicious logic component, which can be intentionally embedded into a circuit during the manufacturing and fabrication processes. The malicious logic component can be referred to as h...

Full description

Saved in:
Bibliographic Details
Main Author: Chandani Devi Ramrup
Other Authors: Vivek Chaturvedi
Format: Final Year Project
Language:English
Published: 2018
Subjects:
Online Access:http://hdl.handle.net/10356/74364
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-74364
record_format dspace
spelling sg-ntu-dr.10356-743642023-03-03T20:33:48Z Survey on different hardware security challenges Chandani Devi Ramrup Vivek Chaturvedi School of Computer Science and Engineering DRNTU::Engineering With the globalization of integrated circuit design and fabrication process, the main concerning issue is of a malicious logic component, which can be intentionally embedded into a circuit during the manufacturing and fabrication processes. The malicious logic component can be referred to as hardware Trojan. It will leak the users’ confidential information out to the adversary, reduce the overall system performance and in the worst case, it may cause a fatal damage to the system. These vulnerabilities would cause serious impacts on the military system, hardware security, and many more. Over the years, there have been many different hardware security challenges, and various ways have been proposed to overcome said challenges. However, as hardware security is a vast topic, that is always evolving rapidly, many different threats, challenges and new proposed solutions are ever present. As such, this report will be focusing on identifying the different security problems existing in hardware security. This report will then show the two different types of suggested solutions and a comparison between the suggested solutions. Bachelor of Engineering (Computer Science) 2018-05-16T12:10:04Z 2018-05-16T12:10:04Z 2018 Final Year Project (FYP) http://hdl.handle.net/10356/74364 en Nanyang Technological University 26 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering
spellingShingle DRNTU::Engineering
Chandani Devi Ramrup
Survey on different hardware security challenges
description With the globalization of integrated circuit design and fabrication process, the main concerning issue is of a malicious logic component, which can be intentionally embedded into a circuit during the manufacturing and fabrication processes. The malicious logic component can be referred to as hardware Trojan. It will leak the users’ confidential information out to the adversary, reduce the overall system performance and in the worst case, it may cause a fatal damage to the system. These vulnerabilities would cause serious impacts on the military system, hardware security, and many more. Over the years, there have been many different hardware security challenges, and various ways have been proposed to overcome said challenges. However, as hardware security is a vast topic, that is always evolving rapidly, many different threats, challenges and new proposed solutions are ever present. As such, this report will be focusing on identifying the different security problems existing in hardware security. This report will then show the two different types of suggested solutions and a comparison between the suggested solutions.
author2 Vivek Chaturvedi
author_facet Vivek Chaturvedi
Chandani Devi Ramrup
format Final Year Project
author Chandani Devi Ramrup
author_sort Chandani Devi Ramrup
title Survey on different hardware security challenges
title_short Survey on different hardware security challenges
title_full Survey on different hardware security challenges
title_fullStr Survey on different hardware security challenges
title_full_unstemmed Survey on different hardware security challenges
title_sort survey on different hardware security challenges
publishDate 2018
url http://hdl.handle.net/10356/74364
_version_ 1759853530704773120