Fingerprint-Based Detection and Diagnosis of Malicious Programs in Hardware


In nowadays's Integrated Circuit business, a foundry, an Intellectual Property supplier, a design house, or a Pc Aided Design vendor could install a hardware Trojan on a chip that executes a malicious program like one providing an info leaking back door. In this paper, we propose a fingerprint-based technique to detect any computer program in hardware. We tend to propose a tamper-evident design (TEA) which samples runtime signals in a hardware system throughout the performance of a computation, and generates a cryptographic hash-based fingerprint that uniquely identifies a sequence of sampled signals. A hardware Trojan cannot tamper with any sampled signal without leaving tamper proof like a missing or incorrect fingerprint. We any verify fingerprints off-chip such that a hardware Trojan cannot tamper with the verification method. As a case study, we detect hardware-primarily based code injection attacks in a very SPARC V8 architecture LEON2 processor. Primarily based on a light-weight block cipher known as PRESENT, a TEA needs only a 4.fivepercent space increase, while avoiding being detected by the TEA increases the realm of a code injection hardware Trojan with a one KB ROM from two.fivepercent to of a LEON2 processor. Such a low value additional allows a lot of advanced tamper diagnosis techniques primarily based on a concurrent generation of multiple fingerprints.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Wi-Fi Fingerprint-Based Indoor Positioning: Recent Advances and ComparisonsABSTRACT:The growing industrial interest in indoor location-based services (ILBS) has spurred recent development of the many indoor positioning
PROJECT TITLE :A Survey of Fingerprint-Based Outdoor LocalizationABSTRACT:A growing range of sensors on sensible mobile devices has led to fast development of varied mobile applications using location-primarily based or context-aware
PROJECT TITLE :Modeling, Detection, and Diagnosis of Faults in Multilevel Memristor MemoriesABSTRACT:Memristors are an attractive choice for use in future memory architectures but are vulnerable to high defect densities thanks
PROJECT TITLE : Security Analysis of Handover Key Management in 4G LTESAE Networks - 2014 ABSTRACT: The goal of 3GPP Long Term Evolution/System Architecture Evolution (LTE/SAE) is to move mobile cellular wireless technology
PROJECT TITLE : Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication - 2014 ABSTRACT: Intervehicular communication (IVC) is an important emerging research area that is expected to considerably contribute

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry