Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/11640
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chaurasia, Rahul | en_US |
dc.contributor.author | Sengupta, Anirban | en_US |
dc.date.accessioned | 2023-05-03T15:04:33Z | - |
dc.date.available | 2023-05-03T15:04:33Z | - |
dc.date.issued | 2022 | - |
dc.identifier.citation | Chaurasia, R., & Sengupta, A. (2022). Protecting trojan secured DSP cores against IP piracy using facial biometrics. Paper presented at the INDICON 2022 - 2022 IEEE 19th India Council International Conference, doi:10.1109/INDICON56171.2022.10039864 Retrieved from www.scopus.com | en_US |
dc.identifier.other | EID(2-s2.0-85149250964) | - |
dc.identifier.uri | https://doi.org/10.1109/INDICON56171.2022.10039864 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/11640 | - |
dc.description.abstract | This paper presents a hardware security methodology for protecting the Trojan secured digital signal processing (DSP) cores against the threat of intellectual property (IP) counterfeiting/piracy using facial biometric based security approach. In the proposed methodology at first, DSP designs are leveraged with Trojan detection capability by constructing the Trojan secured designs using distinct multi-vendor policy. The Trojan secured design is constructed by creating a sister unit of the original DSP design by duplicating its operations. Subsequently, the facial signature has been generated from the facial features of genuine IP owner. Finally, this generated facial signature is embedded into the design in the form of covert secret security constraints during high-level synthesis (HLS) process. Thus, the proposed approach ensures the stronger security of the target Trojan secured design against IP piracy. The security strength of the proposed methodology is measured using probability of coincidence (Pc) and the probability for an attacker to extract the exact signature combination to prove the IP ownership 'P(f)'. Further, the proposed methodology incurs zero design overhead while enabling the robust protection of the Trojan secured DSP cores using facial biometric security. © 2022 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | INDICON 2022 - 2022 IEEE 19th India Council International Conference | en_US |
dc.subject | Biometrics | en_US |
dc.subject | Crime | en_US |
dc.subject | Hardware security | en_US |
dc.subject | High level synthesis | en_US |
dc.subject | Malware | en_US |
dc.subject | Counterfeiting | en_US |
dc.subject | Digital signal processing core | en_US |
dc.subject | Facial biometric | en_US |
dc.subject | Intellectual property piracy | en_US |
dc.subject | Processing core | en_US |
dc.subject | Processing design | en_US |
dc.subject | Security approach | en_US |
dc.subject | Security methodologies | en_US |
dc.subject | Trojan secured design | en_US |
dc.subject | Trojans | en_US |
dc.subject | Digital signal processing | en_US |
dc.title | Protecting Trojan Secured DSP cores against IP piracy using Facial Biometrics | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: