NUST Institutional Repository

Hardware Intrusion Detection using Run-time Parametric Analysis

Show simple item record

dc.contributor.author Imran Hafeez Abbassi
dc.date.accessioned 2020-11-23T11:20:44Z
dc.date.available 2020-11-23T11:20:44Z
dc.date.issued 2019
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/13383
dc.description Supervisor: Dr. Awais Mehmood Kamboh en_US
dc.description.abstract The advancements in electronic systems and technology miniaturization have revolutionized the world in the last couple of decades. The higher complexity of modern designs, economic constraints, and unprecedented pressure of time-to-market dictate the rationale of Integrated Circuit (IC) manufacturing from the third-party fabrication facilities. This rising trend of globalization in circuit design using nanoscale process technologies has increased their vulnerability against malicious intrusions and modi cations. Such modi cations, also referred as Hardware Trojans (HTs), can lead to highly detrimental consequences like causing a circuit to subvert normal operation, leak sensitive information or inducing Denial of Service (DoS). These emerging issues are imposing formidable threats to security-critical applications particularly in the domains of military, communications, and Internet of Things (IoT). The conventional side channel analysis-based HT detection techniques mostly rely on simulations, which are typically exhaustive and computationally intensive. Moreover, it takes substantial resources and time for all-encompassing veri- cation and analysis of the circuits. In this thesis, we apply the strengths of formal veri cation to complement simulation-based HT detection techniques by detailed behavioral analysis of circuits at the early stage of design. Formal methods are conclusive and well-established techniques which are used for description of complex sysvi tems in the form of mathematical models, and then use those models for rigorous analysis. In particular, we present a model checking-based formal framework that is broadly used to: (i) mathematically model an individual circuit for its functional and behavioral veri cation; (ii) analyze and quantify vulnerability of a region in circuit against di erent types of HTs using multiple side-channel parameters; and (iii) identi cation of secure bounds for circuit operations in terms of its side-channel parameters. The outcome of the formal framework is used to design side channel-based sensor that comprehends the behavior of the circuit using a machine learning technique while incorporating the impacts of random process variations. The proposed framework serves to achieve the primary thesis goal of implanting intelligent sensor leveraging rigorous a-priori assessment of IC characteristics. The implemented sensor can be subsequently used for post deployment identi cation of the HT-infected IC. To illustrate the practical e ectiveness of the proposed infrastructure, we present the detailed analysis of multiple benchmark circuits. The formal framework and automated analysis technique, formulated during this thesis, proved e ective in examining the impacts of malicious intrusions on multiple side-channel parameters. Moreover, it provides exibility in identifying the appropriate sensing units to incorporate security in the circuits while minimizing additional hardware. en_US
dc.publisher SEECS, National University of Sciences and Technology, Islamabad en_US
dc.subject Electrical Engineering en_US
dc.title Hardware Intrusion Detection using Run-time Parametric Analysis en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account