Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/13318
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sengupta, Anirban | en_US |
dc.contributor.author | Anshul, Aditya | en_US |
dc.contributor.author | Kothari, Chirag | en_US |
dc.contributor.author | Thakur, Sumer | en_US |
dc.date.accessioned | 2024-03-19T12:57:04Z | - |
dc.date.available | 2024-03-19T12:57:04Z | - |
dc.date.issued | 2023 | - |
dc.identifier.citation | Sengupta, A., Anshul, A., Kothari, C., & Thakur, S. (2023). Secured and Optimized Hardware Accelerators using Key-Controlled Encoded Hash Slices and Firefly Algorithm based Exploration. Proceedings of the International Conference on Microelectronics, ICM. Scopus. https://doi.org/10.1109/ICM60448.2023.10378911 | en_US |
dc.identifier.isbn | 979-8350380828 | - |
dc.identifier.other | EID(2-s2.0-85183328473) | - |
dc.identifier.uri | https://doi.org/10.1109/ICM60448.2023.10378911 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/13318 | - |
dc.description.abstract | The design process of application-specific integrated circuits (ASICs) as hardware accelerators or reusable hardware intellectual property (IP) cores require considering various design goals like area, latency, and security against attacks such as IP piracy and false claims of IP ownership during architectural synthesis. The problem of IP piracy and false IP ownership claim poses a significant threat to hardware IP cores, jeopardizing innovation, fair competition, and economic growth. The proposed work introduces a novel security framework to design secured and optimized hardware accelerators using key-controlled encoded hash slices integrated with firefly algorithm (FF) based design space exploration (DSE) during high level synthesis (HLS). The proposed methodology also demonstrates the embedding of covert security constraints into an optimal 8-point DCT hardware IP design, obtained by performing a tradeoff between area and latency through the FF-based DSE. The proposed methodology achieves stronger tamper tolerance and entropy than recent approaches. The experimental results also provide design cost assessment and optimality analysis. © 2023 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | Proceedings of the International Conference on Microelectronics, ICM | en_US |
dc.subject | Firefly based design space exploration | en_US |
dc.subject | Hardware security | en_US |
dc.subject | Hash-slices | en_US |
dc.subject | HLS | en_US |
dc.subject | IP cores | en_US |
dc.title | Secured and Optimized Hardware Accelerators using Key-Controlled Encoded Hash Slices and Firefly Algorithm based Exploration | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: