Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/13318
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSengupta, Anirbanen_US
dc.contributor.authorAnshul, Adityaen_US
dc.contributor.authorKothari, Chiragen_US
dc.contributor.authorThakur, Sumeren_US
dc.date.accessioned2024-03-19T12:57:04Z-
dc.date.available2024-03-19T12:57:04Z-
dc.date.issued2023-
dc.identifier.citationSengupta, A., Anshul, A., Kothari, C., & Thakur, S. (2023). Secured and Optimized Hardware Accelerators using Key-Controlled Encoded Hash Slices and Firefly Algorithm based Exploration. Proceedings of the International Conference on Microelectronics, ICM. Scopus. https://doi.org/10.1109/ICM60448.2023.10378911en_US
dc.identifier.isbn979-8350380828-
dc.identifier.otherEID(2-s2.0-85183328473)-
dc.identifier.urihttps://doi.org/10.1109/ICM60448.2023.10378911-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/13318-
dc.description.abstractThe design process of application-specific integrated circuits (ASICs) as hardware accelerators or reusable hardware intellectual property (IP) cores require considering various design goals like area, latency, and security against attacks such as IP piracy and false claims of IP ownership during architectural synthesis. The problem of IP piracy and false IP ownership claim poses a significant threat to hardware IP cores, jeopardizing innovation, fair competition, and economic growth. The proposed work introduces a novel security framework to design secured and optimized hardware accelerators using key-controlled encoded hash slices integrated with firefly algorithm (FF) based design space exploration (DSE) during high level synthesis (HLS). The proposed methodology also demonstrates the embedding of covert security constraints into an optimal 8-point DCT hardware IP design, obtained by performing a tradeoff between area and latency through the FF-based DSE. The proposed methodology achieves stronger tamper tolerance and entropy than recent approaches. The experimental results also provide design cost assessment and optimality analysis. © 2023 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceProceedings of the International Conference on Microelectronics, ICMen_US
dc.subjectFirefly based design space explorationen_US
dc.subjectHardware securityen_US
dc.subjectHash-slicesen_US
dc.subjectHLSen_US
dc.subjectIP coresen_US
dc.titleSecured and Optimized Hardware Accelerators using Key-Controlled Encoded Hash Slices and Firefly Algorithm based Explorationen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: