0% found this document useful (0 votes)
49 views6 pages

My Seminar Documentation

This document discusses palm vein technology and is submitted as a seminar report. It contains an introduction to palm vein technology and discusses several chapters related to hardware trojans, including their characterization, models and examples, detection methods, and design approaches to prevent trojan insertion and facilitate detection. The document contains acknowledgments, an index, and references sections.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views6 pages

My Seminar Documentation

This document discusses palm vein technology and is submitted as a seminar report. It contains an introduction to palm vein technology and discusses several chapters related to hardware trojans, including their characterization, models and examples, detection methods, and design approaches to prevent trojan insertion and facilitate detection. The document contains acknowledgments, an index, and references sections.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

PALM VEIN TECHNOLOGY

A Technical seminar Report Submitted


in
Partial Fulfillment of the Requirements
For award of degree of

Bachelor of Technology
in
Electronics and Communication Engineering
Submitted by

T.PUSHPALATHA
(18HP5A0418)
Under the Guidance of

Mr. MD. BAIG M.Tech


Associate Professor

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

ANDHRA LOYOLA INSTITUTE OF ENGINEERING AND TECHNOLOGY

(Approved by AICTE& Affiliated to JNTU, Kakinada)


An ISO 9001:2008 Certified Institution
VIJAYAWADA-520008
2016-2020
ANDHRA LOYOLA INSTITUTE OF ENGINEERING AND
TECHNOLOGY
(Approved by AICTE&Affiliated to JNTU,Kakinada),
An ISO 9001:2008 Certified Institution
VIJAYAWADA-520008
DEPARTMENT OF ELECTRONICS AND COMMUNICATION
ENGINEERING

BONAFIED CERTIFICATE
This is to certify that the seminar report entitled “PALM VEIN TECHNOLOGY”
submitted by T.Pushpalatha (18HP5A0418) in partial fulfillment of the requirements for the
award of the degree of Bachelor Of Technology in ELECTRONICS AND
COMMUNICATION ENGINEERING is a bonafied record of the work carried by him
during the academic year “2020-2021”.

Mr.Md.BAIG M.Tech Mr.M.RAMAKRISHNAM.Tech


Signature of Guide signature of HOD
ACKNOWLEDGEMENT

Apart from the efforts made by me, the success of any work depends largely on the
encouragement to the people who have been instrumental in the successful completion of this
project report.

I deeply indebted to my project guide Mr.Md.BAIG , Associate Professor,


department of ECE. It is a pleasure to express thanks to him for the encouragement and
guidance throughout the course of this project, with valuable suggestions and ideas that
provided the platform to the whole project work. I look at him with great respect for his
profound knowledge and relentless pursuit for perfection. Without his encouragement and
guidance this project would not have materialized.

My sincere thanks to Mr.M.Ramakrishna, Head of the Department who modeled me


both technically and morally for achieving greater success in life.

I would like to thank our Principal of ALIET, Dr.O.Mahesh, for his valuable
statement and suggestion.

I cordially thank our Honorable Director Rev. Fr.Dr.A.Francis Xavier S.J., for
moral support and the excellent facilities provided.

Finally I owe a lot to the teaching and non-teaching staff of the department of ECE for
their direct or indirect support during my thesis paper work, and also my family members,
who have been backing throughout my life, who have been a constant sense of inspiration
and whose blessings made me achieve what I applied for.

T.PUSHPALATHA

18HP5A0418
INDEX
CONTENTS PAGE NO
LIST OF FIGURES i
LIST OF TABLES ii
ABSTRACT 1
INTRODUCTION 2
CHAPTER-1: THE THREAT 3-7
1.1 Trojan Versus Fault 5
1.2 Software Versus Hardware Trojans 5
1.3 Trojan attacks through hardware IP 6
1.4 Complex attack mode 6
CHAPTER -2: CHARACTERIZATION OF HARDWARE TROJANS 8-9
2.1 Physical Characteristics 8
2.2 Activation Characteristics 8
2.2.1 Cryptographic key extraction 9
2.3 Action Characteristics 9
2.4 Peripheral device hardware trojans 9
CHAPTER-3: POTENTIALS OF THREAT 10
CHAPTER-4: TROJAN MODEL, INSTANCES, AND
CLASSIFICATION 11-13
4.1 Trojan Models and Examples 11
4.1.1. Trojans in Cryptographic Engines 12
4.1.2.Trojans in General-Purpose Processors 12
4.2 Trojan Taxonomy 12
CHAPTER-5: COUNTERMEASURES 14-15
5.1 Challenges 14
5.2 Class of Protections 14
CONTENTS PAGE NO
CHAPTER-6: DETECTION 16-24
6.1 Logic testing 16
6.1.1.Coverage Metric 17
6.2 Physical inspection 18
6.3 Functional testing 18
6.4 Built in test 18
6.5 Side channel analysis ` 18
6.5.1. Static Current Analysis 19
6.5.2.Transient Current Analysis 20
6.5.3.Path Delay Analysis 21
6.5.4. Multiple-Parameter Analysis 21
6.5.5. Test Generation for Trojan Detection 22
6.5.6.The Need for a Golden Model 22
6.6 Trojan Detection in Hardware IPs 23
CHAPTER-7: DESIGN FOR SECURITY 25-28
7.1 Design Approaches to Prevent Trojan Insertion 25
7.2 Design Approaches to Facilitate Trojan Detection 26
7.2.1 On-Chip Security Monitors 26
7.2.2 Removing Rare-Triggered Nets 27
7.2.3 Increasing TCR 27
MERITS & DEMERTS 29
CONCLUSION 30
FUTURE SCOPE 31
REFRENCES 32

You might also like