My Seminar Documentation
My Seminar Documentation
Bachelor of Technology
in
Electronics and Communication Engineering
Submitted by
T.PUSHPALATHA
(18HP5A0418)
Under the Guidance of
BONAFIED CERTIFICATE
This is to certify that the seminar report entitled “PALM VEIN TECHNOLOGY”
submitted by T.Pushpalatha (18HP5A0418) in partial fulfillment of the requirements for the
award of the degree of Bachelor Of Technology in ELECTRONICS AND
COMMUNICATION ENGINEERING is a bonafied record of the work carried by him
during the academic year “2020-2021”.
Apart from the efforts made by me, the success of any work depends largely on the
encouragement to the people who have been instrumental in the successful completion of this
project report.
I would like to thank our Principal of ALIET, Dr.O.Mahesh, for his valuable
statement and suggestion.
I cordially thank our Honorable Director Rev. Fr.Dr.A.Francis Xavier S.J., for
moral support and the excellent facilities provided.
Finally I owe a lot to the teaching and non-teaching staff of the department of ECE for
their direct or indirect support during my thesis paper work, and also my family members,
who have been backing throughout my life, who have been a constant sense of inspiration
and whose blessings made me achieve what I applied for.
T.PUSHPALATHA
18HP5A0418
INDEX
CONTENTS PAGE NO
LIST OF FIGURES i
LIST OF TABLES ii
ABSTRACT 1
INTRODUCTION 2
CHAPTER-1: THE THREAT 3-7
1.1 Trojan Versus Fault 5
1.2 Software Versus Hardware Trojans 5
1.3 Trojan attacks through hardware IP 6
1.4 Complex attack mode 6
CHAPTER -2: CHARACTERIZATION OF HARDWARE TROJANS 8-9
2.1 Physical Characteristics 8
2.2 Activation Characteristics 8
2.2.1 Cryptographic key extraction 9
2.3 Action Characteristics 9
2.4 Peripheral device hardware trojans 9
CHAPTER-3: POTENTIALS OF THREAT 10
CHAPTER-4: TROJAN MODEL, INSTANCES, AND
CLASSIFICATION 11-13
4.1 Trojan Models and Examples 11
4.1.1. Trojans in Cryptographic Engines 12
4.1.2.Trojans in General-Purpose Processors 12
4.2 Trojan Taxonomy 12
CHAPTER-5: COUNTERMEASURES 14-15
5.1 Challenges 14
5.2 Class of Protections 14
CONTENTS PAGE NO
CHAPTER-6: DETECTION 16-24
6.1 Logic testing 16
6.1.1.Coverage Metric 17
6.2 Physical inspection 18
6.3 Functional testing 18
6.4 Built in test 18
6.5 Side channel analysis ` 18
6.5.1. Static Current Analysis 19
6.5.2.Transient Current Analysis 20
6.5.3.Path Delay Analysis 21
6.5.4. Multiple-Parameter Analysis 21
6.5.5. Test Generation for Trojan Detection 22
6.5.6.The Need for a Golden Model 22
6.6 Trojan Detection in Hardware IPs 23
CHAPTER-7: DESIGN FOR SECURITY 25-28
7.1 Design Approaches to Prevent Trojan Insertion 25
7.2 Design Approaches to Facilitate Trojan Detection 26
7.2.1 On-Chip Security Monitors 26
7.2.2 Removing Rare-Triggered Nets 27
7.2.3 Increasing TCR 27
MERITS & DEMERTS 29
CONCLUSION 30
FUTURE SCOPE 31
REFRENCES 32