Define hardware Trojans.
Define hardware Trojans. What is the definition of a Modchip? What is JTAG? What primary purpose a PCB serves in any electronic hardware system? Describe possible attacks on a PCB.
Define hardware Trojans. Read More »
Define hardware Trojans. What is the definition of a Modchip? What is JTAG? What primary purpose a PCB serves in any electronic hardware system? Describe possible attacks on a PCB.
Define hardware Trojans. Read More »
Only untrusted design houses are vulnerable to PCB attacks. 1. Trusted design houses are not susceptible to malicious attacks. 2. Modchip attacks are prevalent in gaming consoles. 3. PCB reverse engineering requires industry-grade equipment and expertise. 4. It is comparatively easier to find a Trojan in multilayer PCBs.
Weak PUF is ideal for detecting counterfeit ICs via CRP-based authentication schemes. Error Correction Code (ECC) schemes can be used to improve the robustness for both PUF responses and TRNG outputs. A ring oscillator (RO)-PUF is basically a delay-based PUF. A TRNG must rely on random intrinsic or runtime noise.
Random intrinsic or runtime noise Read More »
Describe a potential attack instance when the design house is trusted in the PCB manufacturing process. Illustrate the scenario with an appropriate case study. 1. What would be an attack instance on PCBs manufactured in untrusted design houses? Describe with a relevant case study. 2. What are the possible attacks on PCBs? Explain the taxonomy
Untrusted design houses Read More »
Briefly discuss the major characteristic differences between PUFs, TRNGs, and DfACs. 1. Briefly discuss the quality metrics used to evaluate PUFs and TRNGs. 2. Explain why RO-PUFs tend to produce more erroneous responses due to runtime noise and aging compared to traditional arbiter-PUFs. 3. Briefly describe what security primitives (strong PUFs, weak PUFs, or TRNGs)
Security primitives Read More »
Ideally, PUFs should have 50% intra-Hamming distance. Ideally, TRNGs should have 50% intra-Hamming distance. Frequency injection attack on an oscillator-based TRNG reduces the throughput, but entropy remains the same.
Depending on the startup behavior, the SRAM-array can be used both as a PUF and a TRNG. 1. Runtime variation (such as power supply noise and Vdd fluctuations) is good for PUFs, but unacceptable for TRNGs. 2. DfAC structures, such as CDIR sensors, utilize aging phenomena for detecting prior usages of the IC.
Power supply noise Read More »
Explain how you can increase the security of the response of a weak PUF (used for key generation) against possible guessing or side-channel attacks. 1. Briefly explain the major challenges that PUFs and TRNGs suffer.
Briefly explain the differences between a TRNG and a PRNG? Which one of them would you consider, if you were only interested in: (a) High entropy. (b) High speed. (c) Low runtime noise.
Consider two types of PUFs, namely “M” and “N”. Their intra- and inter-hamming distances are presented in Fig. 12.22. Explain which type of the two PUFs serves better for the following applications: (a) authentication, (b) key generation.
For faster services, inquiry about new assignments submission or follow ups on your assignments please text us/call us on +1 (251) 265-5102