Skip to Main Content
 

Global Search Box

 
 
 

ETD Abstract Container

Abstract Header

A Trusted and Efficient Security Approach for the Detection of Hardware Trojans and Authentication of FPGA-based Systems

Abstract Details

2017, Doctor of Philosophy, University of Toledo, Engineering (Computer Science).
Research in the area of Hardware-Oriented Security and Trust (HOST) has recently gained momentum as it provides a unique layer of security and trust for semiconductor chips which are widely used in many industrial and life-critical applications such as automobiles, aerospace, defense, Internet of Things, and smart systems. Due to their rapid prototyping capabilities and ease of programmability, recon gurable computing (RC) platforms including Field Programmable Gate Arrays (FPGAs) are becoming increasingly deployed in industry. However, these devices are not fully protected from new cyberattacks. In this research, to protect semiconductor platforms including FPGAs and Application Speci c Integrated Circuits (ASICs) from invasive hardware attacks such as counterfeiting, physical tampering, and reverse engineering; a ring oscillator Physical Unclonable Function (ROPUF) based approach is proposed. This work describes the detailed physical implementation and performance measurement techniques for two novel ROPUF designs using di erent families of more than 50 Xilinx FPGAs. The impact of voltage variations, temperature variations, and aging on ROPUFs is studied in detail. Performance in terms of various metrics including uniqueness, accuracy, reproducibility, repeatability, reliability, and randomness is also evaluated. For this purpose, novel security techniques and algorithms such as systematic process variations reduction algorithm (SVRA), logarithmic abso lute diverseness technique (LDT), reproducibility with intra-die diverseness technique (RID), Logarithmic gamma (ln( )) function approach, and 1-out-of-16 coding algorithms are proposed. A detailed comparison between these techniques and other existing security techniques is presented. Experimental results show an improvement in the performance of the proposed ROPUFs over existing designs in terms of various quality metrics. Also, response bits generated from ROPUFs after applying the LDT and (ln( )) techniques successfully pass the NIST statistical test suites for randomness. Hardware Trojans are spurious speci cations deliberately embodied in silicon chips by an adversary to leak secret information, disable, and/or destroy the device. In order to detect Trojans, this research proposes two innovative ROPUF structures that are more sensitive to voltage uctuations. Experimental results show that the proposed techniques have the ability to detect Trojans inserted in the ICs with better accuracy as compared to earlier PUF structures. As an industrial application, a novel authentication key management scheme is proposed for the security of Advanced Metering Infrastructure (AMI) systems using con gurable ROPUFs. The proposed key management scheme implements end-toend secret key exchange between the power utility companies and smart meters to ensure data con dentiality and integrity. Results for various security levels show that the most frequently used security levels are L1 and L2 with total authentication times of 7.2 ms and 2.88 ms, respectively. The storage requirement for the keys is 456.7 MB over the lifespan of the smart meter. This shows that the proposed key management scheme has a small authentication time and less storage requirements as compared to earlier authentication schemes.
Mohammed Niamat, Prof. (Advisor)
222 p.

Recommended Citations

Citations

  • Amsaad, F. H. M. (2017). A Trusted and Efficient Security Approach for the Detection of Hardware Trojans and Authentication of FPGA-based Systems [Doctoral dissertation, University of Toledo]. OhioLINK Electronic Theses and Dissertations Center. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1512494875469127

    APA Style (7th edition)

  • Amsaad, Fathi. A Trusted and Efficient Security Approach for the Detection of Hardware Trojans and Authentication of FPGA-based Systems. 2017. University of Toledo, Doctoral dissertation. OhioLINK Electronic Theses and Dissertations Center, http://rave.ohiolink.edu/etdc/view?acc_num=toledo1512494875469127.

    MLA Style (8th edition)

  • Amsaad, Fathi. "A Trusted and Efficient Security Approach for the Detection of Hardware Trojans and Authentication of FPGA-based Systems." Doctoral dissertation, University of Toledo, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1512494875469127

    Chicago Manual of Style (17th edition)