Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/15200
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSengupta, Anirbanen_US
dc.date.accessioned2024-12-24T05:20:10Z-
dc.date.available2024-12-24T05:20:10Z-
dc.date.issued2024-
dc.identifier.citationSengupta, A., & Rathor, M. (2024). Fundamentals on HLS-based hardware Trojan. In A. Sengupta, High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection (pp. 263–277). Institution of Engineering and Technology. https://doi.org/10.1049/PBCS084E_ch10en_US
dc.identifier.isbn978-183724118-7-
dc.identifier.isbn978-183724117-0-
dc.identifier.otherEID(2-s2.0-85211874376)-
dc.identifier.urihttps://doi.org/10.1049/PBCS084E_ch10-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/15200-
dc.description.abstractThe chapter describes the fundamentals of high-level synthesis (HLS)-based hardware Trojan and its various types. This chapter provides an overview of hardware Trojan and discusses the motivation for an adversary to perform an HLS-based hardware Trojan attack. Further, it highlights the potential sites for hardware Trojan insertion in the semiconductor design supply chain. It discusses in detail the three different types of HLS-based hardware Trojan attacks followed by hardware Trojan in 3PIP modules. The organization of the chapter is as follows: Section 10.1 discusses a brief overview of hardware Trojan, different ways of the hardware Trojan insertion followed by the Trojan insertion during HLS and its potential effectsen_US
dc.description.abstractSection 10.2 provides an overview of three different types of HLS-based hardware Trojan attacks, viz. battery exhaustion, degradation, and downgrade, and discusses the threat scenario. Section 10.3 presents insights on battery exhaustion attacks with a motivational example. Section 10.4 presents insights on degradation attacks with a motivational example while discussing its impact on security and overhead. Section 10.4 presents insights on downgrade attack and explains with the help of compromising secure hash algorithmen_US
dc.description.abstractSection 10.5 presents insights on hardware Trojan in 3PIP modules and explains using an exampleen_US
dc.description.abstractSection 10.6 concludes the chapter. © The Institution of Engineering and Technology and its licensors 2024.en_US
dc.language.isoenen_US
dc.publisherInstitution of Engineering and Technologyen_US
dc.sourceHigh-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protectionen_US
dc.titleFundamentals on HLS-based hardware Trojanen_US
dc.typeBook Chapteren_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: