NUST Institutional Repository

Runtime Detection of Hardware Trojans using LTL Monitors

Show simple item record

dc.contributor.author Ahmad, Ayaz
dc.date.accessioned 2023-08-27T05:26:48Z
dc.date.available 2023-08-27T05:26:48Z
dc.date.issued 2019
dc.identifier.other 118704
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/37598
dc.description Supervisor: Dr. Osman Hasan en_US
dc.description.abstract Advanced system-on-chip (SoC) designs use large number of intellectual property (IP) blocks being acquired from third-party vendors. However, a single vulnerable IP can compromise the trustworthiness of an entire SoC, e.g., by causing execution failures, degrading performance or leaking some inside information. One of the root causes for such vulnerabilities are malicious alterations known as hardware trojans. In this paper, we provide a formal methods based framework to monitor and detect the hardware trojans at runtime. Unlike existing solutions to the untrusted IP problem, which rely on verification of an IP before their integration into an SoC, our approach is based on the idea of runtime resilience. In order to demonstrate its effectiveness, we apply our proposed framework to a couple of standard benchmarks (i.e., I2C Protocol and RS232). Our results show that runtime monitors are able to detect underlying trojans with a minimalistic overhead. Our proposed framework is inline with the recommendations of IEC 61508 and ISO 26262 – two main international standards for industrial automation and automotive industry, respectively. en_US
dc.language.iso en en_US
dc.publisher School of Electrical Engineering and computer Science (SEECS), NUST en_US
dc.title Runtime Detection of Hardware Trojans using LTL Monitors en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

  • MS [882]

Show simple item record

Search DSpace


Advanced Search

Browse

My Account