Automated trojan detection and analysis in field programmable gate arraysa

dc.contributor.authorHoughton, Nicholas
dc.contributor.supervisorGebali, Fayez
dc.contributor.supervisorMoein, Samer
dc.date.accessioned2016-12-16T23:04:23Z
dc.date.available2016-12-16T23:04:23Z
dc.date.copyright2016en_US
dc.date.issued2016-12-16
dc.degree.departmentDepartment of Electrical and Computer Engineeringen_US
dc.degree.levelMaster of Applied Science M.A.Sc.en_US
dc.description.abstractElectronics have become such a staple in modern life that we are just as a ected by their vulnerabilities as they are. Ensuring that the processors that control them are secure is paramount to our intellectual safety, our nancial safety, our privacy, and even our personal safety. The market for integrated circuits is steadily being consumed by a recon gurable type of processor known as a eld-programmable gate- array (FPGA). The very features that make this type of device so successful also make them susceptible to attack. FPGAs are recon gured by software; this makes it easy for attackers to make modi cation. Such modi cations are known as hardware trojans. There have been many techniques and strategies to ensure that these devices are free from trojans but few have taken advantage of the central feature of these devices. The con guration Bitstream is the binary le which programs these devices. By extracting and analyzing it, a much more accurate and e cient means of detecting trojans can be achieved. This discussion presents a new methodology for exploiting the power of the con guration Bitstream to detect and described hardware trojans. A software application is developed that automates this methodology.en_US
dc.description.proquestcode0537en_US
dc.description.proquestcode0544en_US
dc.description.proquestcode0984en_US
dc.description.proquestemailnhoughto@uvic.caen_US
dc.description.scholarlevelGraduateen_US
dc.identifier.urihttp://hdl.handle.net/1828/7673
dc.languageEnglisheng
dc.language.isoenen_US
dc.rightsAvailable to the World Wide Weben_US
dc.subjectTrojanen_US
dc.subjectHardwareen_US
dc.subjectSecurityen_US
dc.subjectFPGAen_US
dc.subjectDetectionen_US
dc.subjectAnalysisen_US
dc.subjectJavaen_US
dc.subjectAutomateden_US
dc.titleAutomated trojan detection and analysis in field programmable gate arraysaen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Houghton_Nicholas_MASc_2016.pdf
Size:
1.31 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.74 KB
Format:
Item-specific license agreed upon to submission
Description: