Blockchain and time-delay based hardware Trojan detection
Blockchain and time-delay based hardware Trojan detection
Nowadays, various electronic devices bring convenience to people’s life and work, which is inseparable from the development of microelectronics technology. The IC chip is the core part of these devices like brains control their logical functions operating normally. With the economic globalisation and the competition among the chip design companies, there may be many parties involved in the design process of the IC chip, which makes the IC design have more vulnerabilities and brings potential threats to the IC. According to that, ensuring that the original circuits design of the IC does not tamper with the malicious circuits (e.g. Hardware Trojan) during the IC design process is essential. In this thesis, we propose a novel multi-path Hardware Trojan detection based on path delay and blockchain technology, which mainly targets the malicious behaviour of Hardware Trojan insertion in the IC design process. First of all, during transferring design files in the IC design project, the relevant design modules will be checked and compared through the detector and comparator designed in this thesis to confirm whether there is a Hardware Trojan in the module and its modified location. At the same time, during the design file transferring, the blockchain-based tracking system will record the relevant information (e.g. personal information of the designer, the checksum of the IC design file). Suppose the existence of a Hardware Trojan is detected, then through the blockchain-based tracking system. In that case, the relevant information can be accurately found, such as the target design files and the person in charge of the part of the modified circuit. Compared with other path delay detection methods, this multi-path Hardware Trojan detection method designed in this thesis can accurately find the location of the tampered circuits part and the relevant designer in charge. It can modify and restore the suitable design files in time. Therefore, this detection method can solve the problem of Hardware Trojan insertion in a targeted manner. In the IC design process, this detection method saves the time cost of locating and correcting the circuits inserted in Hardware Trojan and solves some vulnerabilities (e.g. malicious designer) of Hardware Trojan inserted in IC.
University of Southampton
Zhai, Dongyao
61ebc701-9565-49d9-8564-885f6b37fa92
July 2022
Zhai, Dongyao
61ebc701-9565-49d9-8564-885f6b37fa92
Zwolinski, Mark
adfcb8e7-877f-4bd7-9b55-7553b6cb3ea0
Zhai, Dongyao
(2022)
Blockchain and time-delay based hardware Trojan detection.
University of Southampton, Doctoral Thesis, 170pp.
Record type:
Thesis
(Doctoral)
Abstract
Nowadays, various electronic devices bring convenience to people’s life and work, which is inseparable from the development of microelectronics technology. The IC chip is the core part of these devices like brains control their logical functions operating normally. With the economic globalisation and the competition among the chip design companies, there may be many parties involved in the design process of the IC chip, which makes the IC design have more vulnerabilities and brings potential threats to the IC. According to that, ensuring that the original circuits design of the IC does not tamper with the malicious circuits (e.g. Hardware Trojan) during the IC design process is essential. In this thesis, we propose a novel multi-path Hardware Trojan detection based on path delay and blockchain technology, which mainly targets the malicious behaviour of Hardware Trojan insertion in the IC design process. First of all, during transferring design files in the IC design project, the relevant design modules will be checked and compared through the detector and comparator designed in this thesis to confirm whether there is a Hardware Trojan in the module and its modified location. At the same time, during the design file transferring, the blockchain-based tracking system will record the relevant information (e.g. personal information of the designer, the checksum of the IC design file). Suppose the existence of a Hardware Trojan is detected, then through the blockchain-based tracking system. In that case, the relevant information can be accurately found, such as the target design files and the person in charge of the part of the modified circuit. Compared with other path delay detection methods, this multi-path Hardware Trojan detection method designed in this thesis can accurately find the location of the tampered circuits part and the relevant designer in charge. It can modify and restore the suitable design files in time. Therefore, this detection method can solve the problem of Hardware Trojan insertion in a targeted manner. In the IC design process, this detection method saves the time cost of locating and correcting the circuits inserted in Hardware Trojan and solves some vulnerabilities (e.g. malicious designer) of Hardware Trojan inserted in IC.
Text
Final Thesis no declaration of authorship
- Version of Record
Text
Permission to deposit thesis - form
Restricted to Repository staff only
More information
Published date: July 2022
Identifiers
Local EPrints ID: 467790
URI: http://eprints.soton.ac.uk/id/eprint/467790
PURE UUID: e43adc58-5f3d-4fc2-aec1-8483bcbf1450
Catalogue record
Date deposited: 21 Jul 2022 18:11
Last modified: 17 Mar 2024 02:35
Export record
Contributors
Author:
Dongyao Zhai
Thesis advisor:
Mark Zwolinski
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics