Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/13653
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSengupta, Anirbanen_US
dc.contributor.authorAnshul, Adityaen_US
dc.date.accessioned2024-04-26T12:43:36Z-
dc.date.available2024-04-26T12:43:36Z-
dc.date.issued2024-
dc.identifier.citationSengupta, A., & Anshul, A. (2024). Watermarking Hardware IPs using Design Parameter Driven Encrypted Dispersion Matrix with Eigen Decomposition Based Security Framework. IEEE Access. Scopus. https://doi.org/10.1109/ACCESS.2024.3382202en_US
dc.identifier.issn2169-3536-
dc.identifier.otherEID(2-s2.0-85189171166)-
dc.identifier.urihttps://doi.org/10.1109/ACCESS.2024.3382202-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/13653-
dc.description.abstractIn the present era of the global design supply chain, several untrustworthy entities can be involved. From an intellectual property (IP) vendor&ampen_US
dc.description.abstract#x2019en_US
dc.description.abstracts perspective, an attacker in the system-on-chip (SoC) integration house may pirate the design IP and/or claim ownership. This paper introduces a novel watermarking methodology using design parameter driven encrypted dispersion matrix with an eigen decomposition-based security framework as a detective countermeasure against the aforementioned threat. Our work considers the IP vendor as the defender and the SoC integration house as the attacker. The proposed approach presents a security framework that extracts the characteristics of the IP vendor selected design space parameters and the design space&ampen_US
dc.description.abstract#x2019en_US
dc.description.abstracts characteristics in terms of IP vendor chosen resource configurations and exploits them as unique features to embed them as digital evidence for protecting IP design. In the presented approach, secret security constraints are extracted for embedding into the IP design using a number of components such as dispersion matrix generation block, eigen decomposition block, AES encryption block, and high level synthesis (HLS) register allocation block. The results of the proposed approach, in comparison with prior works, offer an improvement in the probability of coincidence upto ~107, tamper tolerance upto ~10231, and entropy upto ~10545 at negligible design overhead. Authorsen_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceIEEE Accessen_US
dc.subjectCryptographyen_US
dc.subjectDispersionen_US
dc.subjectDispersion matrixen_US
dc.subjectEigen decompositionen_US
dc.subjectEigenvalues and eigenfunctionsen_US
dc.subjectEncryptionen_US
dc.subjectEntropyen_US
dc.subjectHardware securityen_US
dc.subjectHardware securityen_US
dc.subjectIP networksen_US
dc.subjectIP piracyen_US
dc.subjectMatrix decompositionen_US
dc.subjectPrivacyen_US
dc.subjectSecurityen_US
dc.subjectSupply chainsen_US
dc.subjectWatermarkingen_US
dc.subjectWatermarkingen_US
dc.titleWatermarking Hardware IPs using Design Parameter Driven Encrypted Dispersion Matrix with Eigen Decomposition Based Security Frameworken_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: