Hardware trojans in reconfigurable computing / by Qazi Arbab Ahmed ; [Supervisor: Prof. Dr. Marco Platzner]. Paderborn, 2022
Inhalt
- Acknowledgements
- Abstract
- Zusammenfassung
- Table of Contents
- 1 Introduction
- 2 Background and Related Works
- 3 Proof-Carrying Hardware Versus the Bitstream-level Hardware Trojans in FPGAs
- 3.1 Malicious LUT Hardware Trojan
- 3.2 Proof-Carrying Hardware
- 3.3 Bitstream-level Proof-Carrying Hardware for ICE FPGAs
- 3.4 Tool Flow for ICE FPGAs
- 3.5 Attack Scenarios
- 3.6 Experimental Validation
- 3.7 Discussion
- 3.8 Chapter Conclusion
- 4 Post-Configuration Activation of Hardware Trojans in FPGAs
- 4.1 Overview and Threat Model
- 4.2 Methodology
- 4.3 Experimental Validation
- 4.4 Discussion
- 4.5 Chapter Conclusion
- 5 Conclusion
- 6 Outlook
- List of Tables
- List of Listings
- List of Algorithms
- List of Figures
- List of Abbreviations
- Author's Publications
- Bibliography
