Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/334182
Title: | Certain investigations on improved hardware security constraints using logic obfuscation technique |
Researcher: | Baluprithviraj, K N |
Guide(s): | Vijayachitra, S |
Keywords: | Hardware security Security of Integrated Circuits Reverse Engineering |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | Hardware security has become an important topic for more researchers from related research domains joining in this field recently. Security of Integrated Circuits (ICs) has emerged as a significant concern at completely different level of IC life cycle, spanning design, test, fabrication and deployment. Recently developed ICs are becoming increasingly newlinevulnerable to various forms of security threats such as 1) illegal use of hardware Intellectual Property (IP) or IP Piracy , 2) illegal manufacturing of IC or IC Piracy , 3) insertion of malicious circuits, referred to as Hardware Trojan , in a design to cause in field circuit malfunction and 4) leakage of secret information from an IC. The economics of electronic manufacturing dictates widespread outsourcing of IC fabrication to off shore facilities, which increases the vulnerability to hardware attacks. In the present research, Novel hardware design approaches that incorporate a key based design obfuscation scheme to effectively protect a design against various security threats, while incurring low hardware and computational overheads are explored. Obfuscation is a technique that makes comprehending and Reverse Engineering (RE) a design difficult task. The effectiveness of the obfuscation based approaches for protection against IP reverse-engineering and piracy, hardware Trojan and information leakage is evaluated with benchmark circuits. Logic locking is a technique that has received significant attention. It has been effectively utilized for ensuring the function of digital circuits against IC theft. It protects a hardware design netlist from a variety of hardware security threats such as tampering, reverse engineering, and piracy, stemming from untrusted chip foundry and end-users. newline newline |
Pagination: | xx,139p. |
URI: | http://hdl.handle.net/10603/334182 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 174.68 kB | Adobe PDF | View/Open |
02_certificates.pdf | 115.63 kB | Adobe PDF | View/Open | |
03_bonafidecertificate.pdf | 138.98 kB | Adobe PDF | View/Open | |
04_vivaproceedings.pdf | 201.48 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 183.91 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 468.6 kB | Adobe PDF | View/Open | |
07_contents.pdf | 387.08 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 350.51 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 361.03 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 52.67 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 1.1 MB | Adobe PDF | View/Open | |
12_chapter2.pdf | 427.19 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 954.77 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 1.14 MB | Adobe PDF | View/Open | |
15_chapter5.pdf | 796.82 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 262.26 kB | Adobe PDF | View/Open | |
17_references.pdf | 1.54 MB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 255 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 123.28 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: