100 likes | 257 Views
Detection of Covertly Embedded Hardware in Digital Systems. Justin VanTassel. Hardware Tampering. Software Attacks Rootkits Backdoors Spyware Key loggers Viruses List goes on and on… Hardware Attacks?. Images taken from wikipedia.org. Main Idea . Finite State Machine Model.
E N D
EECE Dept. Binghamton University Detection of Covertly Embedded Hardware in Digital Systems Justin VanTassel
Hardware Tampering • Software Attacks • Rootkits • Backdoors • Spyware • Key loggers • Viruses • List goes on and on… • Hardware Attacks? EECE Dept. Binghamton University Images taken from wikipedia.org
Main Idea • Finite State Machine Model EECE Dept. Binghamton University
Example - Stoplight EECE Dept. Binghamton University
Example - Stoplight EECE Dept. Binghamton University
Example - Stoplight EECE Dept. Binghamton University
One Hot State Encoding EECE Dept. Binghamton University
Reprogrammable Devices • FPGA (Field Programmable Gate Arrays) • Speed optimization • Area constraints • LUT (Look up tables) EECE Dept. Binghamton University
People Involved with Research • Professor Summerville • Jim Moronski (PhD) • QiongGui (PhD) • Justin VanTassel (MS) • Alex Pang (MS) • Kyle Temkin (BS) • Ivan Sekyonda (BS) • Nick Tangchakkrachai (BS) EECE Dept. Binghamton University
Questions/Comments • Email: jvantas1@binghamton.edu EECE Dept. Binghamton University