Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/15199
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sengupta, Anirban | en_US |
dc.date.accessioned | 2024-12-24T05:20:10Z | - |
dc.date.available | 2024-12-24T05:20:10Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | Sengupta, A., & Rathor, M. (2024). Hardware Trojans—Detective countermeasure against HLS-based hardware Trojan attack. In A. Sengupta, High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection (pp. 279–292). Institution of Engineering and Technology. https://doi.org/10.1049/PBCS084E_ch11 | en_US |
dc.identifier.other | EID(2-s2.0-85211864092) | - |
dc.identifier.uri | https://doi.org/10.1049/PBCS084E_ch11 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/15199 | - |
dc.description.abstract | The focus of this chapter is to discuss a lightweight and efficient countermeasure for detecting high-level synthesis (HLS)-based hardware Trojan attacks. This chapter first describes the HLS-based Trojan attack and the contemporary solutions to counter them. Further, a lightweight countermeasure for high-level Trojan detection (LC-HLTD) is discussed in detail along with the case studies on some applications. The organization of the chapter is as follows: Section 11.1 discusses the trustworthiness of computer-aided-design (CAD) tools | en_US |
dc.description.abstract | Section 11.2 introduces the black-hat HLS | en_US |
dc.description.abstract | Section 11.3 discusses contemporary solutions to battery exhaustion attack | en_US |
dc.description.abstract | Section 11.4 presents the lightweight countermeasure for high-level Trojan detection, i.e., LC-HLTD while discussing salient features of LC-HLTD, threat scenario of LC-HLTD, high-level transformation (HLT) tool for the detective countermeasure, different phases of LC-HLTD approach, and applying LC-HLTD for detecting the battery exhaustion attack (due to pseudo operations insertion) | en_US |
dc.description.abstract | Section 11.5 analyzes some case studies on digital signal processing (DSP) applications | en_US |
dc.description.abstract | and Section 11.6 concludes the chapter. © The Institution of Engineering and Technology and its licensors 2024. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institution of Engineering and Technology | en_US |
dc.source | High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection | en_US |
dc.title | Hardware Trojans-detective countermeasure against HLS-based hardware Trojan attack | en_US |
dc.type | Book Chapter | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: