The University of Southampton
University of Southampton Institutional Repository

Blockchain and time-delay based hardware Trojan detection

Blockchain and time-delay based hardware Trojan detection
Blockchain and time-delay based hardware Trojan detection
Nowadays, various electronic devices bring convenience to people’s life and work, which is inseparable from the development of microelectronics technology. The IC chip is the core part of these devices like brains control their logical functions operating normally. With the economic globalisation and the competition among the chip design companies, there may be many parties involved in the design process of the IC chip, which makes the IC design have more vulnerabilities and brings potential threats to the IC. According to that, ensuring that the original circuits design of the IC does not tamper with the malicious circuits (e.g. Hardware Trojan) during the IC design process is essential. In this thesis, we propose a novel multi-path Hardware Trojan detection based on path delay and blockchain technology, which mainly targets the malicious behaviour of Hardware Trojan insertion in the IC design process. First of all, during transferring design files in the IC design project, the relevant design modules will be checked and compared through the detector and comparator designed in this thesis to confirm whether there is a Hardware Trojan in the module and its modified location. At the same time, during the design file transferring, the blockchain-based tracking system will record the relevant information (e.g. personal information of the designer, the checksum of the IC design file). Suppose the existence of a Hardware Trojan is detected, then through the blockchain-based tracking system. In that case, the relevant information can be accurately found, such as the target design files and the person in charge of the part of the modified circuit. Compared with other path delay detection methods, this multi-path Hardware Trojan detection method designed in this thesis can accurately find the location of the tampered circuits part and the relevant designer in charge. It can modify and restore the suitable design files in time. Therefore, this detection method can solve the problem of Hardware Trojan insertion in a targeted manner. In the IC design process, this detection method saves the time cost of locating and correcting the circuits inserted in Hardware Trojan and solves some vulnerabilities (e.g. malicious designer) of Hardware Trojan inserted in IC.
University of Southampton
Zhai, Dongyao
61ebc701-9565-49d9-8564-885f6b37fa92
Zhai, Dongyao
61ebc701-9565-49d9-8564-885f6b37fa92
Zwolinski, Mark
adfcb8e7-877f-4bd7-9b55-7553b6cb3ea0

Zhai, Dongyao (2022) Blockchain and time-delay based hardware Trojan detection. University of Southampton, Doctoral Thesis, 170pp.

Record type: Thesis (Doctoral)

Abstract

Nowadays, various electronic devices bring convenience to people’s life and work, which is inseparable from the development of microelectronics technology. The IC chip is the core part of these devices like brains control their logical functions operating normally. With the economic globalisation and the competition among the chip design companies, there may be many parties involved in the design process of the IC chip, which makes the IC design have more vulnerabilities and brings potential threats to the IC. According to that, ensuring that the original circuits design of the IC does not tamper with the malicious circuits (e.g. Hardware Trojan) during the IC design process is essential. In this thesis, we propose a novel multi-path Hardware Trojan detection based on path delay and blockchain technology, which mainly targets the malicious behaviour of Hardware Trojan insertion in the IC design process. First of all, during transferring design files in the IC design project, the relevant design modules will be checked and compared through the detector and comparator designed in this thesis to confirm whether there is a Hardware Trojan in the module and its modified location. At the same time, during the design file transferring, the blockchain-based tracking system will record the relevant information (e.g. personal information of the designer, the checksum of the IC design file). Suppose the existence of a Hardware Trojan is detected, then through the blockchain-based tracking system. In that case, the relevant information can be accurately found, such as the target design files and the person in charge of the part of the modified circuit. Compared with other path delay detection methods, this multi-path Hardware Trojan detection method designed in this thesis can accurately find the location of the tampered circuits part and the relevant designer in charge. It can modify and restore the suitable design files in time. Therefore, this detection method can solve the problem of Hardware Trojan insertion in a targeted manner. In the IC design process, this detection method saves the time cost of locating and correcting the circuits inserted in Hardware Trojan and solves some vulnerabilities (e.g. malicious designer) of Hardware Trojan inserted in IC.

Text
Final Thesis no declaration of authorship - Version of Record
Available under License University of Southampton Thesis Licence.
Download (23MB)
Text
Permission to deposit thesis - form
Restricted to Repository staff only

More information

Published date: July 2022

Identifiers

Local EPrints ID: 467790
URI: http://eprints.soton.ac.uk/id/eprint/467790
PURE UUID: e43adc58-5f3d-4fc2-aec1-8483bcbf1450
ORCID for Mark Zwolinski: ORCID iD orcid.org/0000-0002-2230-625X

Catalogue record

Date deposited: 21 Jul 2022 18:11
Last modified: 17 Mar 2024 02:35

Export record

Contributors

Author: Dongyao Zhai
Thesis advisor: Mark Zwolinski ORCID iD

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×