Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/13112
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Anshul, Aditya | en_US |
dc.contributor.author | Sengupta, Anirban | en_US |
dc.date.accessioned | 2024-01-29T05:18:25Z | - |
dc.date.available | 2024-01-29T05:18:25Z | - |
dc.date.issued | 2023 | - |
dc.identifier.citation | Anshul, A., & Sengupta, A. (2023). A Survey of High Level Synthesis Based Hardware Security Approaches for Reusable IP Cores [Feature]. IEEE Circuits and Systems Magazine. Scopus. https://doi.org/10.1109/MCAS.2023.3325607 | en_US |
dc.identifier.issn | 1531-636X | - |
dc.identifier.other | EID(2-s2.0-85182026382) | - |
dc.identifier.uri | https://doi.org/10.1109/MCAS.2023.3325607 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/13112 | - |
dc.description.abstract | This paper presents a novel survey of high level synthesis (HLS) based hardware security approaches for reusable intellectual property (IP) cores used in consumer electronics and computing systems. A succinct review of all major HLS based hardware security approaches applied on reusable IP cores, along with their design flow and security analysis, is provided. The paper presents a detailed design flow of hardware integrated circuits (ICs) along with vulnerability points where potential attacks/threats are possible. Trustworthy and untrustworthy regimes in the design flow have also been highlighted in the discussion. Further, a discussion of detective and preventive control-based HLS hardware security approaches used for hardware IP cores has also been presented, including an analysis of prominent structural obfuscation, logic locking (logic encryption), and IP core protection (IPP) techniques. Each approach has been lucidly explained in terms of its threat model, algorithm, and security analysis. Finally, a security comparison of hardware IP obfuscation approaches in terms of strength of obfuscation security metric as well as a security comparison of IPP approaches in terms of probability of coincidence security metric, have also been introduced. © 2001-2012 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | IEEE Circuits and Systems Magazine | en_US |
dc.subject | hardware IP | en_US |
dc.subject | hardware security | en_US |
dc.subject | High level synthesis | en_US |
dc.subject | IP protection | en_US |
dc.title | A Survey of High Level Synthesis Based Hardware Security Approaches for Reusable IP Cores [Feature] | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: