Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/13158
Title: Revisiting Black-Hat HLS: A Lightweight Countermeasure to HLS-Aided Trojan Attack
Authors: Sengupta, Anirban
Keywords: Batteries;Computer aided design tool;Hardware;hardware Trojan detection;high level synthesis;IP networks;Optimization;Resource management;Threat modeling;Trojan horses
Issue Date: 2023
Publisher: Institute of Electrical and Electronics Engineers Inc.
Citation: Rathor, M., & Sengupta, A. (2023). Revisiting Black-Hat HLS: A Lightweight Countermeasure to HLS-Aided Trojan Attack. IEEE Embedded Systems Letters. Scopus. https://doi.org/10.1109/LES.2023.3327793
Abstract: One of the dark side of horizontal semiconductor business model could be the supply of compromised computer aided design (CAD) tools by an adversary to the designers. A compromised or black-hat high level synthesis (HLS) tool may secretly insert Trojan into the design being synthesized to affect its functional or non-functional aspects. Recently, a black-hat HLS was presented which inserts fake operations during the scheduling process to enable battery exhaustion attack. In this paper, we present a framework to detect the fake operations inserted by a compromised HLS with the help of scheduling information provided by the tool. We implemented our detection framework on a number of benchmarks and analyzed the detection time and accuracy. We also analyzed the cost of fake operation insertion in terms of design area and delay overhead. IEEE
URI: https://doi.org/10.1109/LES.2023.3327793
https://dspace.iiti.ac.in/handle/123456789/13158
ISSN: 1943-0663
Type of Material: Journal Article
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: