Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

University of South Florida

2018

Hardware Security

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Gate Level Probabilistic Simulation Based Hardware Trojan Susceptibility Analysis Of Combinational Circuits, Venkata Lakshmi Bhargavi Gurram Oct 2018

Gate Level Probabilistic Simulation Based Hardware Trojan Susceptibility Analysis Of Combinational Circuits, Venkata Lakshmi Bhargavi Gurram

USF Tampa Graduate Theses and Dissertations

Today multi-million gate integrated circuits are being commonly used in many critical (eg., health care) and sensitive (eg., military) applications. Therefore, they are susceptible to malicious modifications, namely, Hardware Trojans (HTs), with the intent of leaking sensitive information, denial-of-service etc. There are many ways of inserting Hardware Trojans in ICs. Thus, HT detection and mitigation are very important tasks. In this thesis, we propose a novel probabilistic simulation based approach to estimate the susceptibility of a combinational circuit to a HT. One of the common ways is to simulate the netlist with typical input sequences and identifying low activity nets …


Emerging Non-Volatile Memory Technologies For Computing And Security, Rekha Govindaraj May 2018

Emerging Non-Volatile Memory Technologies For Computing And Security, Rekha Govindaraj

USF Tampa Graduate Theses and Dissertations

With CMOS technology scaling reaching its limitations rigorous research of alternate and competent technologies is paramount to push the boundaries of computing. Spintronic and resistive memories have proven to be effective alternatives in terms of area, power and performance to CMOS because of their non-volatility, ability for logic computing and easy integration with CMOS. However, deeper investigations to understand their physical phenomenon and improve their properties such as writability, stability, reliability, endurance, uniformity with minimal device-device variations is necessary for deployment as memories in commercial applications. Application of these technologies beyond memory and logic are investigated in this thesis i.e. …