Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/17774
| Title: | HLS Trojan Tampering Attack of IP Designs for Power Drainage using Timer-Sensitive Trojan Trigger based Automated Logic-Transformation |
| Authors: | Sengupta, Anirban Bhui, Nabendu Chourasia, Vishal |
| Issue Date: | 2026 |
| Publisher: | Institute of Electrical and Electronics Engineers Inc. |
| Citation: | Sengupta, A., Bhui, N., & Chourasia, V. (2026). HLS Trojan Tampering Attack of IP Designs for Power Drainage using Timer-Sensitive Trojan Trigger based Automated Logic-Transformation. IEEE Embedded Systems Letters. https://doi.org/10.1109/LES.2026.3656894 |
| Abstract: | Hardware intellectual property (IP) designs used in the system-on-chip of electronics systems are designed using High-level synthesis (HLS). However, HLS design phases exposes security vulnerabilities that an attacker (rogue HLS tool developer) can exploit to covertly insert backdoor hardware Trojan (HT) in order to achieve various Trojan payloads. This paper introduces a new type of HLS-aided HT vector for inducing tampering attack on IP designs called ‘Timer-Sensitive Trojan trigger based automated logic-Transformation (TST-HT)’ that can induce significant power drainage in IP designs. The proposed HLS-aided TST-HT can be inserted covertly during the datapath design stage and triggered under attacker pre-defined timer-sensitive rare condition which makes it elusive by nature. © 2009-2012 IEEE. |
| URI: | https://dx.doi.org/10.1109/LES.2026.3656894 https://dspace.iiti.ac.in:8080/jspui/handle/123456789/17774 |
| ISSN: | 1943-0663 |
| Type of Material: | Journal Article |
| Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: