Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Hardware Trojans in Wireless Cryptog...
~
Liu, Yu.
Linked to FindBook
Google Book
Amazon
博客來
Hardware Trojans in Wireless Cryptographic ICs.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Hardware Trojans in Wireless Cryptographic ICs./
Author:
Liu, Yu.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2017,
Description:
118 p.
Notes:
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: B.
Contained By:
Dissertation Abstracts International79-03B(E).
Subject:
Electrical engineering. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10675234
ISBN:
9780355392555
Hardware Trojans in Wireless Cryptographic ICs.
Liu, Yu.
Hardware Trojans in Wireless Cryptographic ICs.
- Ann Arbor : ProQuest Dissertations & Theses, 2017 - 118 p.
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: B.
Thesis (Ph.D.)--The University of Texas at Dallas, 2017.
Over the last decade, the problem of hardware Trojans in manufactured integrated circuits (ICs) has been a topic of intense investigation by academic researchers and governmental entities. Hardware Trojans are malicious modifications introduced in a manufactured IC, which can be exploited by a knowledgeable adversary to cause incorrect results, steal sensitive data, or even incapacitate a chip. Given the sensitive nature of applications wherein hardware Trojan-infested ICs may be deployed, developing detection methodologies has become paramount. Indeed, traditional test methods fall short in revealing hardware Trojans, as they are geared towards identifying modeled defects and, therefore, cannot reveal unmodeled malicious inclusions.
ISBN: 9780355392555Subjects--Topical Terms:
649834
Electrical engineering.
Hardware Trojans in Wireless Cryptographic ICs.
LDR
:03083nmm a2200301 4500
001
2159493
005
20180628100933.5
008
190424s2017 ||||||||||||||||| ||eng d
020
$a
9780355392555
035
$a
(MiAaPQ)AAI10675234
035
$a
(MiAaPQ)0382vireo:184Liu
035
$a
AAI10675234
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Liu, Yu.
$3
1259717
245
1 0
$a
Hardware Trojans in Wireless Cryptographic ICs.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2017
300
$a
118 p.
500
$a
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: B.
500
$a
Adviser: Yiorgos Makris.
502
$a
Thesis (Ph.D.)--The University of Texas at Dallas, 2017.
520
$a
Over the last decade, the problem of hardware Trojans in manufactured integrated circuits (ICs) has been a topic of intense investigation by academic researchers and governmental entities. Hardware Trojans are malicious modifications introduced in a manufactured IC, which can be exploited by a knowledgeable adversary to cause incorrect results, steal sensitive data, or even incapacitate a chip. Given the sensitive nature of applications wherein hardware Trojan-infested ICs may be deployed, developing detection methodologies has become paramount. Indeed, traditional test methods fall short in revealing hardware Trojans, as they are geared towards identifying modeled defects and, therefore, cannot reveal unmodeled malicious inclusions.
520
$a
Various hardware Trojan detection methods have been proposed, most of them targeted digital circuits. As pointed out therein, the Analog/RF domain is an attractive attack target, since the wireless communication of these chips with the environment over public channels simplifies the process of staging an attack without obtaining physical access to the I/O of the chip. On the other hand, signals in an Analog/RF IC are continuous and highly-correlated to one another; hence, the likelihood of a modification disturbing these correlations is very high. Therefore, this dissertation outlines the problems and proposes three solutions to ensure trustworthiness of Analog/RF ICs: namely, i) Utilize statistical side channel fingerprinting to detect hardware Trojan in Analog/RF ICs. ii) Propose to use a combination of a trusted simulation model, measurements from process control monitors (PCMs), that are typically present either on die or on wafer kerf, and advanced statistical tail modeling techniques to detect hardware Trojan without relying on golden chips. iii) Introduce a concurrent hardware Trojan detection (CHTD) methodology for wireless cryptographic integrated circuits (ICs), based on continuous extraction of a side-channel fingerprint and evaluation by a trained on-chip neural classifier. All methods proposed in this dissertation have been verified with measurements from actual silicon chips.
590
$a
School code: 0382.
650
4
$a
Electrical engineering.
$3
649834
690
$a
0544
710
2
$a
The University of Texas at Dallas.
$b
Electrical Engineering.
$3
1679269
773
0
$t
Dissertation Abstracts International
$g
79-03B(E).
790
$a
0382
791
$a
Ph.D.
792
$a
2017
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10675234
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9359040
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login