語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Hardware Trojans in Wireless Cryptog...
~
Liu, Yu.
FindBook
Google Book
Amazon
博客來
Hardware Trojans in Wireless Cryptographic ICs.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Hardware Trojans in Wireless Cryptographic ICs./
作者:
Liu, Yu.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2017,
面頁冊數:
118 p.
附註:
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: B.
Contained By:
Dissertation Abstracts International79-03B(E).
標題:
Electrical engineering. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10675234
ISBN:
9780355392555
Hardware Trojans in Wireless Cryptographic ICs.
Liu, Yu.
Hardware Trojans in Wireless Cryptographic ICs.
- Ann Arbor : ProQuest Dissertations & Theses, 2017 - 118 p.
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: B.
Thesis (Ph.D.)--The University of Texas at Dallas, 2017.
Over the last decade, the problem of hardware Trojans in manufactured integrated circuits (ICs) has been a topic of intense investigation by academic researchers and governmental entities. Hardware Trojans are malicious modifications introduced in a manufactured IC, which can be exploited by a knowledgeable adversary to cause incorrect results, steal sensitive data, or even incapacitate a chip. Given the sensitive nature of applications wherein hardware Trojan-infested ICs may be deployed, developing detection methodologies has become paramount. Indeed, traditional test methods fall short in revealing hardware Trojans, as they are geared towards identifying modeled defects and, therefore, cannot reveal unmodeled malicious inclusions.
ISBN: 9780355392555Subjects--Topical Terms:
649834
Electrical engineering.
Hardware Trojans in Wireless Cryptographic ICs.
LDR
:03083nmm a2200301 4500
001
2159493
005
20180628100933.5
008
190424s2017 ||||||||||||||||| ||eng d
020
$a
9780355392555
035
$a
(MiAaPQ)AAI10675234
035
$a
(MiAaPQ)0382vireo:184Liu
035
$a
AAI10675234
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Liu, Yu.
$3
1259717
245
1 0
$a
Hardware Trojans in Wireless Cryptographic ICs.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2017
300
$a
118 p.
500
$a
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: B.
500
$a
Adviser: Yiorgos Makris.
502
$a
Thesis (Ph.D.)--The University of Texas at Dallas, 2017.
520
$a
Over the last decade, the problem of hardware Trojans in manufactured integrated circuits (ICs) has been a topic of intense investigation by academic researchers and governmental entities. Hardware Trojans are malicious modifications introduced in a manufactured IC, which can be exploited by a knowledgeable adversary to cause incorrect results, steal sensitive data, or even incapacitate a chip. Given the sensitive nature of applications wherein hardware Trojan-infested ICs may be deployed, developing detection methodologies has become paramount. Indeed, traditional test methods fall short in revealing hardware Trojans, as they are geared towards identifying modeled defects and, therefore, cannot reveal unmodeled malicious inclusions.
520
$a
Various hardware Trojan detection methods have been proposed, most of them targeted digital circuits. As pointed out therein, the Analog/RF domain is an attractive attack target, since the wireless communication of these chips with the environment over public channels simplifies the process of staging an attack without obtaining physical access to the I/O of the chip. On the other hand, signals in an Analog/RF IC are continuous and highly-correlated to one another; hence, the likelihood of a modification disturbing these correlations is very high. Therefore, this dissertation outlines the problems and proposes three solutions to ensure trustworthiness of Analog/RF ICs: namely, i) Utilize statistical side channel fingerprinting to detect hardware Trojan in Analog/RF ICs. ii) Propose to use a combination of a trusted simulation model, measurements from process control monitors (PCMs), that are typically present either on die or on wafer kerf, and advanced statistical tail modeling techniques to detect hardware Trojan without relying on golden chips. iii) Introduce a concurrent hardware Trojan detection (CHTD) methodology for wireless cryptographic integrated circuits (ICs), based on continuous extraction of a side-channel fingerprint and evaluation by a trained on-chip neural classifier. All methods proposed in this dissertation have been verified with measurements from actual silicon chips.
590
$a
School code: 0382.
650
4
$a
Electrical engineering.
$3
649834
690
$a
0544
710
2
$a
The University of Texas at Dallas.
$b
Electrical Engineering.
$3
1679269
773
0
$t
Dissertation Abstracts International
$g
79-03B(E).
790
$a
0382
791
$a
Ph.D.
792
$a
2017
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10675234
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9359040
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入