Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/17774
Title: HLS Trojan Tampering Attack of IP Designs for Power Drainage using Timer-Sensitive Trojan Trigger based Automated Logic-Transformation
Authors: Sengupta, Anirban
Bhui, Nabendu
Chourasia, Vishal
Issue Date: 2026
Publisher: Institute of Electrical and Electronics Engineers Inc.
Citation: Sengupta, A., Bhui, N., & Chourasia, V. (2026). HLS Trojan Tampering Attack of IP Designs for Power Drainage using Timer-Sensitive Trojan Trigger based Automated Logic-Transformation. IEEE Embedded Systems Letters. https://doi.org/10.1109/LES.2026.3656894
Abstract: Hardware intellectual property (IP) designs used in the system-on-chip of electronics systems are designed using High-level synthesis (HLS). However, HLS design phases exposes security vulnerabilities that an attacker (rogue HLS tool developer) can exploit to covertly insert backdoor hardware Trojan (HT) in order to achieve various Trojan payloads. This paper introduces a new type of HLS-aided HT vector for inducing tampering attack on IP designs called ‘Timer-Sensitive Trojan trigger based automated logic-Transformation (TST-HT)’ that can induce significant power drainage in IP designs. The proposed HLS-aided TST-HT can be inserted covertly during the datapath design stage and triggered under attacker pre-defined timer-sensitive rare condition which makes it elusive by nature. © 2009-2012 IEEE.
URI: https://dx.doi.org/10.1109/LES.2026.3656894
https://dspace.iiti.ac.in:8080/jspui/handle/123456789/17774
ISSN: 1943-0663
Type of Material: Journal Article
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: