Course "Hardware Trojan Detection and Prevention" will be Offered at
UCONN by CHASE Faculty, Prof.
Domenic Forte, Spring 2014
Hardware Trojans are malicious modifications made to original IC
designs that reduce system reliability and security (changes to
functionality, leakage of private data, etc.). With the potential for
ICs containing Trojans to end up in commercial or military systems,
there has been substantial interest not only in academia, but also in
governmental agencies and industry to detect and prevent Trojan
insertion. ECE 6095 - 005 is a graduate-level advanced-topics course
that intends to help students:
Topics to Be Covered:
the challenges and impact of hardware Trojans.
themselves with existing state-of-the-art research in the area.
- Build a
foundation of knowledge in overlapping areas such as signal processing,
detection, and estimation theories.
existing methods, improve upon them, and develop new research
techniques for hardware Trojan detection and prevention.
reading, writing, and presentation skills.
- Basics of
VLSI design, synthesis, fabrication, and test
to hardware Trojans, Trojan taxonomy, and mitigation taxonomy including
destructive, design-time, test-time, and run-time
methods of Trojan insertion
detection of Trojans
sensors: timing, power, temperature
detection/prevention of Trojans
(DFS) based methods for Trojan detection
verification and Proof Carrying Code (PCC)
Processing, Estimation, and Detection Theory
estimation: Kalman filter, Extended Kalman filter, Particle filter
to detection theory: Hypothesis Testing, Neyman Pearson Theorem,
Minimum Probability of Error and Bayes Risk
applications in Trojan problem
Paper "Path ORAM: An Extremely Simple Oblivious RAM
Protocol" Co-authored by CHASE Faculty, Prof. Marten van Dijk, Received
the Best Student Paper Award at the 2013 ACM
Conference on Computer and Communications Security (CCS)
ORAM is an extremely simple Oblivious RAM protocol that obfuscates
memory access patterns with a small amount of client storage. Partly
due to its simplicity, Path ORAM is the most practical ORAM scheme
known to date and has been adopted in the design of secure processors
since its proposal. From a theoretical perspective, for block sizes
bigger than ω(log^2 N) where N is the capacity of Path ORAM in number
of blocks, Path ORAM is asymptotically better than the best known ORAM
scheme with small client storage.
Read the paper here.
C.W. Fletcher,L. Ren, X.
Yu, and S.