Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/15197
Title: | Hardware obfuscation-algorithmic transformation-based obfuscation for secure floorplan-driven high-level synthesis |
Authors: | Sengupta, Anirban Chaurasia, Rahul |
Issue Date: | 2024 |
Publisher: | Institution of Engineering and Technology |
Citation: | Sengupta, A., & Chaurasia, R. (2024). Hardware obfuscation-algorithmic transformation-based obfuscation for secure floorplan-driven high-level synthesis. In A. Sengupta, High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection (pp. 229–262). Institution of Engineering and Technology. https://doi.org/10.1049/PBCS084E_ch9 |
Abstract: | The chapter describes an integrated methodology that leverages algorithmic transformation-based obfuscation with crypto-watermarking for generating HLS-driven secure floorplan for loop-based IP designs (Sengupta and Kachave, 2017 Sengupta and Rathor, 2020 Sengupta et al., 2017). The significance is that most of the modern electronics systems are integrated with complex loop-based applications to perform important functions such as filtering, convolution, image processing, etc. Loop-based applications can deliver efficient performance if designed using dedicated hardware intellectual property (IP) cores using high-level synthesis (HLS). However, globalization in the design supply chain introduces security vulnerabilities during IP design that need robust countermeasures. More explicitly, the chapter presents a discussion on the following: (a) methodology for generating HLS-driven secure floorplan for loop unrolled hardware IPs (b) integration of algorithmic transformation-based obfuscation with crypto-watermarking during HLS to provide sturdy detective countermeasure against IP piracy and false IP ownership claim, while simultaneously reducing latency (c) security-aware physical design-based HLS that is capable to convert a loop-based high-level code (representing a computation-intensive application) into its respective early secure floorplan that considers watermark embedding information of the datapath modules. The rest of the chapter has been organized as follows: Section 9.1 provides the introduction of the chapter Section 9.2 discusses prior similar methodologies Section 9.3 provides details on methodology for algorithmic transformation-based obfuscation for secure floorplan-driven HLS Section 9.4 provides a detailed analysis and discussion and Section 9.5 concludes the chapter by summarizing the chapter’s findings and implications. © The Institution of Engineering and Technology and its licensors 2024. |
URI: | https://doi.org/10.1049/PBCS084E_ch9 https://dspace.iiti.ac.in/handle/123456789/15197 |
ISBN: | 978-183724118-7 978-183724117-0 |
Type of Material: | Book Chapter |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: