Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/15196
Title: | Hardware obfuscation-high level synthesis-based structural obfuscation for hardware security and trust |
Authors: | Sengupta, Anirban Chaurasia, Rahul |
Issue Date: | 2024 |
Publisher: | Institution of Engineering and Technology |
Citation: | Sengupta, A., & Chaurasia, R. (2024). Hardware obfuscation-high level synthesis-based structural obfuscation for hardware security and trust. In A. Sengupta, High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection (pp. 187–227). Institution of Engineering and Technology. https://doi.org/10.1049/PBCS084E_ch8 |
Abstract: | The chapter describes a high-level synthesis (HLS)-driven methodology for generating secure hardware intellectual property (IP) core design with fault detectability feature using multi-cut-based structural obfuscation and physical biometric (Chaurasia and Sengupta, 2023a). In this methodology, firstly, the IP design is leveraged with transient fault detectability feature and is transformed/obscured using multi-cut-based structural obfuscation. This transformation serves as the first layer of security, ensuring the protection of the design against potential reverse engineering attempts by an adversary. Subsequently, the design is covertly embedded with physical biometric of IP vendor. The embedded naturally unique biometric information of genuine IP vendor serves as the second layer of security, ensuring the protection of the design against IP piracy. Thus, HLS-driven hardware security methodology can concurrently offer security of “fault-detectable IP designs” against the following hardware threats: (a) potential reverse engineering threat by an adversary from the SoC layout stage in an untrustworthy foundry and (b) IP piracy by an adversary that may present in the SoC integration house. The rest of the chapter is structured as follows: Section 8.1 provides the introduction of the chapter Section 8.2 delves into the various threat model scenario Section 8.3 provides background on transient fault Section 8.4 explores the multi-cut-based structural obfuscation technique and physical biometrics for enhanced hardware IP security Section 8.5 presents a case study on IIR filter application framework Section 8.6 presents security features of the methodology Section 8.7 analyzes the security of IP design achieved through multi-cut based structural obfuscation and physical biometrics Section 8.8 concludes the chapter by summarizing its findings and implications. © The Institution of Engineering and Technology and its licensors 2024. |
URI: | https://doi.org/10.1049/PBCS084E_ch8 https://dspace.iiti.ac.in/handle/123456789/15196 |
ISBN: | 978-183724118-7 978-183724117-0 |
Type of Material: | Book Chapter |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: