Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/13158
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sengupta, Anirban | en_US |
dc.date.accessioned | 2024-01-31T10:50:37Z | - |
dc.date.available | 2024-01-31T10:50:37Z | - |
dc.date.issued | 2023 | - |
dc.identifier.citation | Rathor, M., & Sengupta, A. (2023). Revisiting Black-Hat HLS: A Lightweight Countermeasure to HLS-Aided Trojan Attack. IEEE Embedded Systems Letters. Scopus. https://doi.org/10.1109/LES.2023.3327793 | en_US |
dc.identifier.issn | 1943-0663 | - |
dc.identifier.other | EID(2-s2.0-85181561225) | - |
dc.identifier.uri | https://doi.org/10.1109/LES.2023.3327793 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/13158 | - |
dc.description.abstract | One of the dark side of horizontal semiconductor business model could be the supply of compromised computer aided design (CAD) tools by an adversary to the designers. A compromised or black-hat high level synthesis (HLS) tool may secretly insert Trojan into the design being synthesized to affect its functional or non-functional aspects. Recently, a black-hat HLS was presented which inserts fake operations during the scheduling process to enable battery exhaustion attack. In this paper, we present a framework to detect the fake operations inserted by a compromised HLS with the help of scheduling information provided by the tool. We implemented our detection framework on a number of benchmarks and analyzed the detection time and accuracy. We also analyzed the cost of fake operation insertion in terms of design area and delay overhead. IEEE | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | IEEE Embedded Systems Letters | en_US |
dc.subject | Batteries | en_US |
dc.subject | Computer aided design tool | en_US |
dc.subject | Hardware | en_US |
dc.subject | hardware Trojan detection | en_US |
dc.subject | high level synthesis | en_US |
dc.subject | IP networks | en_US |
dc.subject | Optimization | en_US |
dc.subject | Resource management | en_US |
dc.subject | Threat modeling | en_US |
dc.subject | Trojan horses | en_US |
dc.title | Revisiting Black-Hat HLS: A Lightweight Countermeasure to HLS-Aided Trojan Attack | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: