Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/15965
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sengupta, Anirban | en_US |
dc.date.accessioned | 2025-04-22T17:45:36Z | - |
dc.date.available | 2025-04-22T17:45:36Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | Sengupta, A., & Chaurasia, R. (2024). SWIFT: Swarm Intelligence Driven ESL Synthesis for Functional Trojan Fortification. Proceedings - 10th IEEE International Symposium on Smart Electronic Systems, ISES 2024. https://doi.org/10.1109/iSES63344.2024.00033 | en_US |
dc.identifier.other | EID(2-s2.0-105002634471) | - |
dc.identifier.uri | https://doi.org/10.1109/iSES63344.2024.00033 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/15965 | - |
dc.description.abstract | This paper presents a novel Swarm Intelligence driven Electronic System-Level (ESL) synthesis-based security methodology for functional Trojan fortification (called 'SWIFT'). Backdoor functional Trojan covertly inserted in the reusable hardware designs is a major concern for ensuring reliability functionality of consumer electronics (CE) systems and also for ensuring consumer trust. Erroneous computed output due to malicious functional Trojan can cause malfunctioning of such reusable IP cores. Therefore, the proposed methodology introduces a framework that integrates triple modular redundancy (TMR) along with a unique multi-vendor allocation that enables the generation of Trojan fortified (resistant) reusable hardware intellectual property (IP) designs capable of countering functional Trojan, if present and producing the correct output. The proposed approach integrates the swarm intelligence-based design space exploration (DSE) process with Trojan fortification design process to optimize any possible design overhead incurred due to TMR design. Results of the experimental evaluation prove that the proposed approach can generate low-cost Trojan fortified IP designs at meagre exploration time and at the expense of nominal overhead compared to prior work (that handle Trojan detection only). Further, the presented approach can handle a several potential vulnerabilities in the DSP design, which shows its robust security strength. © 2024 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | Proceedings - 10th IEEE International Symposium on Smart Electronic Systems, iSES 2024 | en_US |
dc.subject | Hardware design | en_US |
dc.subject | Security | en_US |
dc.subject | Swarm | en_US |
dc.subject | Trojan | en_US |
dc.title | SWIFT: Swarm Intelligence Driven ESL Synthesis for Functional Trojan Fortification | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: