Skip to Main Content
Frequently Asked Questions
Submit an ETD
Global Search Box
Need Help?
Keyword Search
Participating Institutions
Advanced Search
School Logo
Files
File List
case1270133481.pdf (8.54 MB)
ETD Abstract Container
Abstract Header
Hardware Security through Design Obfuscation
Author Info
Chakraborty, Rajat Subhra
Permalink:
http://rave.ohiolink.edu/etdc/view?acc_num=case1270133481
Abstract Details
Year and Degree
2010, Doctor of Philosophy, Case Western Reserve University, EECS - Computer Engineering.
Abstract
Security of integrated circuits (ICs) has emerged as a major concern at different stages of IC life-cycle, spanning design, test, fabrication and deployment. Modern ICs are becoming increasingly vulnerable to various forms of security threats, such as: 1) illegal use of hardware intellectual property (IP) or “IP Piracy”; 2) illegal manufacturing of IC or “IC Piracy”; 3) insertion of malicious circuits, referred as “Hardware Trojan”, in a design to cause in-field circuit malfunction, and 4) leakage of secret information from an IC. These security threats are accentuated by current IC design practices, such as the widespread use of hardware IP modules to design complex system-on-chips (SoCs). In addition, the economics of electronic manufacturing dictates widespread outsourcing of integrated circuit fabrication to off-shore facilities, which increases the vulnerability to these attacks. In this research, we explore novel hardware design approaches that incorporate a key-based design obfuscation scheme to effectively protect a design against various security threats, while incurring low hardware and computational overheads. Obfuscation is a technique that makes comprehending and reverse-engineering a design difficult. To the best of our knowledge, this is the first effort to develop a systematic and provably robust hardware obfuscation approach that enables hardware protection at different stages of the IC life-cycle. Effectiveness of these approaches for protection against IP reverse-engineering and piracy, hardware Trojan and scan-based information leakage is evaluated with benchmark circuits and open-source IP cores. The obfuscation approaches are developed for both firm (gate-level) and soft (register transfer level) IPs. The principles of the obfuscation approach have been extended to protection of embedded software against piracy and malicious modification. An enhanced secure IC design flow with associated computer-aided design (CAD) tools is also developed.
Committee
Swarup Bhunia (Committee Chair)
Christos Papachristou (Committee Member)
Francis Merat (Committee Member)
David McIntyre (Committee Member)
Pankaj Rohatgi (Committee Member)
Pages
183 p.
Subject Headings
Electrical Engineering
Keywords
Hardware security
;
design obfuscation
;
hardware Trojan
;
statistical logic testing
;
secure scan design
;
software obfuscation
;
secure system-on-chip design
Recommended Citations
Refworks
EndNote
RIS
Mendeley
Citations
Chakraborty, R. S. (2010).
Hardware Security through Design Obfuscation
[Doctoral dissertation, Case Western Reserve University]. OhioLINK Electronic Theses and Dissertations Center. http://rave.ohiolink.edu/etdc/view?acc_num=case1270133481
APA Style (7th edition)
Chakraborty, Rajat.
Hardware Security through Design Obfuscation.
2010. Case Western Reserve University, Doctoral dissertation.
OhioLINK Electronic Theses and Dissertations Center
, http://rave.ohiolink.edu/etdc/view?acc_num=case1270133481.
MLA Style (8th edition)
Chakraborty, Rajat. "Hardware Security through Design Obfuscation." Doctoral dissertation, Case Western Reserve University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1270133481
Chicago Manual of Style (17th edition)
Abstract Footer
Document number:
case1270133481
Download Count:
5,366
Copyright Info
© 2010, all rights reserved.
This open access ETD is published by Case Western Reserve University School of Graduate Studies and OhioLINK.