Publication Date

2021

Document Type

Thesis

Committee Members

Saiyu Ren, Ph.D. (Advisor); Ray Siferd, Ph.D. (Committee Member); Marian K. Kazimierczuk, Ph.D. (Committee Member)

Degree Name

Master of Science in Electrical Engineering (MSEE)

Abstract

As feature size is scaling down, dynamic power consumption reduces but static power consumption increases. Due to the increase of static power, leakage currents as a source, the information can be exploited successfully as a side-channel to recover the secrets of the cryptographic implementations. An attacker who has access to the hardware fabrication can insert a Trojan to the design to steal or alter information. In this thesis, a post-fab static voltage variation/detection technique is developed to detect the potential fabrication process Trojan insertion. The technique is, dividing the designed circuit into N equal segments, where each segment would have same leakage current under certain input patterns. One-ohm resistor is embedded between each segment network to ground path to convert leakage current to voltage. Voltage drop on the one-ohm resistor is measured post-fab to identify the authentic of the design mathematically and statistically by comparing all the segment measure data. 250 Monte Carlo simulation results show that the minimum Trojan is 0.0868% of the host circuit size with 100% detection probability.

Page Count

74

Department or Program

Department of Electrical Engineering

Year Degree Awarded

2021

Creative Commons License

Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License.


Share

COinS