Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Engineering

Compact Field Programmable Gate Array Based Physical Unclonable Functions Circuits, Yangpingqing Hu May 2022

Compact Field Programmable Gate Array Based Physical Unclonable Functions Circuits, Yangpingqing Hu

Theses and Dissertations

The Physical Unclonable Functions (PUFs) is a candidate to provide a secure solid root source for identification and authentication applications. It is precious for FPGA-based systems, as FPGA designs are vulnerable to IP thefts and cloning. Ideally, the PUFs should have strong random variations from one chip to another, and thus each PUF is unique and hard to replicate. Also, the PUFs should be stable over time so that the same challenge bits always yield the same result. Correspondingly, one of the major challenges for FPGA-based PUFs is the difficulty of avoiding systematic bias in the integrated circuits but also …


Hardware Security And Side Channel Power Analysis For 16x16 Booth Multiplier In 65nm Cmos Technology, Kanchan Vissamsetty Jan 2021

Hardware Security And Side Channel Power Analysis For 16x16 Booth Multiplier In 65nm Cmos Technology, Kanchan Vissamsetty

Browse all Theses and Dissertations

As feature size is scaling down, dynamic power consumption reduces but static power consumption increases. Due to the increase of static power, leakage currents as a source, the information can be exploited successfully as a side-channel to recover the secrets of the cryptographic implementations. An attacker who has access to the hardware fabrication can insert a Trojan to the design to steal or alter information. In this thesis, a post-fab static voltage variation/detection technique is developed to detect the potential fabrication process Trojan insertion. The technique is, dividing the designed circuit into N equal segments, where each segment would have …


Design And Implementation Of A Multi-Modal Sensor With On-Chip Security, Ava Hedayatipour Aug 2020

Design And Implementation Of A Multi-Modal Sensor With On-Chip Security, Ava Hedayatipour

Doctoral Dissertations

With the advancement of technology, wearable devices for fitness tracking, patient monitoring, diagnosis, and disease prevention are finding ways to be woven into modern world reality. CMOS sensors are known to be compact, with low power consumption, making them an inseparable part of wireless medical applications and Internet of Things (IoT). Digital/semi-digital output, by the translation of transmitting data into the frequency domain, takes advantages of both the analog and digital world. However, one of the most critical measures of communication, security, is ignored and not considered for fabrication of an integrated chip. With the advancement of Moore's law and …


Comprehensive Designs Of Innovate Secure Hardware Devices Against Machine Learning Attacks And Power Analysis Attacks, Yiming Wen Apr 2020

Comprehensive Designs Of Innovate Secure Hardware Devices Against Machine Learning Attacks And Power Analysis Attacks, Yiming Wen

Electrical & Computer Engineering Theses & Dissertations

Hardware security is an innovate subject oriented from growing demands of cybersecurity and new information vulnerabilities from physical leakages on hardware devices. However, the mainstream of hardware manufacturing industry is still taking benefits of products and the performance of chips as priority, restricting the design of hardware secure countermeasures under a compromise to a finite expense of overheads. Consider the development trend of hardware industries and state-of-the-art researches of architecture designs, this dissertation proposes some new physical unclonable function (PUF) designs as countermeasures to side-channel attacks (SCA) and machine learning (ML) attacks simultaneously. Except for the joint consideration of hardware …


Built-In Return-Oriented Programs In Embedded Systems And Deep Learning For Hardware Trojan Detection, Nathanael R. Weidler Dec 2019

Built-In Return-Oriented Programs In Embedded Systems And Deep Learning For Hardware Trojan Detection, Nathanael R. Weidler

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Microcontrollers and integrated circuits in general have become ubiquitous in the world today. All aspects of our lives depend on them from driving to work, to calling our friends, to checking our bank account balance. People who would do harm to individuals, corporations and nation states are aware of this and for that reason they seek to find or create and exploit vulnerabilities in integrated circuits. This dissertation contains three papers dealing with these types of vulnerabilities. The first paper talks about a vulnerability that was found on a microcontroller, which is a type of integrated circuit. The final two …


Assuring Intellectual Property Through Physical And Functional Comparisons, Adam Kendall Hastings Dec 2018

Assuring Intellectual Property Through Physical And Functional Comparisons, Adam Kendall Hastings

Theses and Dissertations

Hardware trojans pose a serious threat to trusted computing. However, hardware trojan detection methods are both numerous and onerous, making hardware trojan detection a difficult and time-consuming procedure. This thesis introduces the IP Assurance Framework, which drastically improves the time it takes design teams to test for hardware trojans. The IP Assurance Framework is implemented in two ways: The first method, Physical Assurance, compares instantiated IP blocks to a golden model via physical-level comparisons, while the second method, Functional Assurance, compares IP to a golden model using logical-level comparisons. Both methods are demonstrated to distinguish between tampered and untampered IP …


Towards Utilization Of Distributed On-Chip Power Delivery Against Em Side-Channel Attacks, Ahmed Waheed Khan Apr 2018

Towards Utilization Of Distributed On-Chip Power Delivery Against Em Side-Channel Attacks, Ahmed Waheed Khan

USF Tampa Graduate Theses and Dissertations

Non-invasive side-channel attacks (SCAs) are potent attacks on a cryptographic circuit that can reveal its secret key without requiring lots of equipment. EM side-channel leakage is typically the derivative of the power consumption profile of a circuit. Since the fluctuations of the supply voltage strongly depend on the topology and features of the power distribution network (PDN), design of the PDN has a direct impact on EM side-channel leakage signature.

In this thesis, we explore the security implications of distributed on-chip voltage regulators against EM side-channel attacks. Extensive HFSS simulations have demonstrated that the maximum EM radiation can be reduced …


Exploiting On-Chip Voltage Regulators As A Countermeasure Against Power Analysis Attacks, Weize Yu May 2017

Exploiting On-Chip Voltage Regulators As A Countermeasure Against Power Analysis Attacks, Weize Yu

USF Tampa Graduate Theses and Dissertations

Non-invasive side-channel attacks (SCA) are powerful attacks which can be used to obtain the secret key in a cryptographic circuit in feasible time without the need for expensive measurement equipment. Power analysis attacks (PAA) are a type of SCA that exploit the correlation between the leaked power consumption information and processed/stored data. Differential power analysis (DPA) and leakage power analysis (LPA) attacks are two types of PAA that exploit different characteristics of the side-channel leakage profile. DPA attacks exploit the correlation between the input data and dynamic power consumption of cryptographic circuits. Alternatively, LPA attacks utilize the correlation between the …


Idpal – A Partially-Adiabatic Energy-Efficient Logic Family: Theory And Applications To Secure Computing, Mihail T. Cutitaru Jul 2014

Idpal – A Partially-Adiabatic Energy-Efficient Logic Family: Theory And Applications To Secure Computing, Mihail T. Cutitaru

Electrical & Computer Engineering Theses & Dissertations

Low-power circuits and issues associated with them have gained a significant amount of attention in recent years due to the boom in portable electronic devices. Historically, low-power operation relied heavily on technology scaling and reduced operating voltage, however this trend has been slowing down recently due to the increased power density on chips. This dissertation introduces a new very-low power partially-adiabatic logic family called Input-Decoupled Partially-Adiabatic Logic (IDPAL) with applications in low-power circuits. Experimental results show that IDPAL reduces energy usage by 79% compared to equivalent CMOS implementations and by 25% when compared to the best adiabatic implementation. Experiments ranging …


Variation-Derived Chip Security And Accelerated Simulation Of Variations, William Paul Griffin Oct 2013

Variation-Derived Chip Security And Accelerated Simulation Of Variations, William Paul Griffin

Open Access Dissertations

In modern ICs, variations can be quite troublesome. Ensuring quality and yield requires careful and resource-intensive simulation under the effects of parameter variations. Threshold voltage approximation of parameter variations can help accelerate simulations, but it comes with unknown losses in quality. Instead, we propose a parameter reduction technique designed to minimize quality loss through careful analysis of the source transistor model and the set of input parameter variations. Using Pao-Sah's Double Integral model, we demonstrate the relative quality of our reduced parameter approach versus threshold voltage approximation.

Despite their negative role in circuitry, variations can be useful for security applications. …