Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/15197
Title: Hardware obfuscation-algorithmic transformation-based obfuscation for secure floorplan-driven high-level synthesis
Authors: Sengupta, Anirban
Chaurasia, Rahul
Issue Date: 2024
Publisher: Institution of Engineering and Technology
Citation: Sengupta, A., & Chaurasia, R. (2024). Hardware obfuscation-algorithmic transformation-based obfuscation for secure floorplan-driven high-level synthesis. In A. Sengupta, High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection (pp. 229–262). Institution of Engineering and Technology. https://doi.org/10.1049/PBCS084E_ch9
Abstract: The chapter describes an integrated methodology that leverages algorithmic transformation-based obfuscation with crypto-watermarking for generating HLS-driven secure floorplan for loop-based IP designs (Sengupta and Kachave, 2017
Sengupta and Rathor, 2020
Sengupta et al., 2017). The significance is that most of the modern electronics systems are integrated with complex loop-based applications to perform important functions such as filtering, convolution, image processing, etc. Loop-based applications can deliver efficient performance if designed using dedicated hardware intellectual property (IP) cores using high-level synthesis (HLS). However, globalization in the design supply chain introduces security vulnerabilities during IP design that need robust countermeasures. More explicitly, the chapter presents a discussion on the following: (a) methodology for generating HLS-driven secure floorplan for loop unrolled hardware IPs
(b) integration of algorithmic transformation-based obfuscation with crypto-watermarking during HLS to provide sturdy detective countermeasure against IP piracy and false IP ownership claim, while simultaneously reducing latency
(c) security-aware physical design-based HLS that is capable to convert a loop-based high-level code (representing a computation-intensive application) into its respective early secure floorplan that considers watermark embedding information of the datapath modules. The rest of the chapter has been organized as follows: Section 9.1 provides the introduction of the chapter
Section 9.2 discusses prior similar methodologies
Section 9.3 provides details on methodology for algorithmic transformation-based obfuscation for secure floorplan-driven HLS
Section 9.4 provides a detailed analysis and discussion
and Section 9.5 concludes the chapter by summarizing the chapter’s findings and implications. © The Institution of Engineering and Technology and its licensors 2024.
URI: https://doi.org/10.1049/PBCS084E_ch9
https://dspace.iiti.ac.in/handle/123456789/15197
ISBN: 978-183724118-7
978-183724117-0
Type of Material: Book Chapter
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: