Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4527
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSengupta, Anirbanen_US
dc.contributor.authorRathor, Mahendraen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:34:46Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:34:46Z-
dc.date.issued2021-
dc.identifier.citationSengupta, A., & Rathor, M. (2021). Structural transformation-based obfuscation using pseudo-operation mixing for securing data-intensive IP cores. Secured hardware accelerators for DSP and image processing applications (pp. 339-3356)en_US
dc.identifier.isbn9781839533068-
dc.identifier.otherEID(2-s2.0-85114561317)-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4527-
dc.description.abstractThe chapter describes a structural transformation-based obfuscation approach using pseudo-operation mixing for securing data-intensive cores or hardware accelerators. The presented approach is based on pseudo-operation mixing algorithm that attains significant structural obscurity in the design to enable unobviousness without affecting the correct functionality. The chapter is organized as follows: Section 9.1 discusses about the introduction of the chapter; Section 9.2 describes the structural transformation-based obfuscation methodology; Section 9.3 presents pseudo operation mixing based structural obfuscation (POM-SO) tool that is capable of performing pseudooperation mixing-based structural obfuscation (SOB); Section 9.4 presents analysis of case studies in terms of security and design cost, especially focusing on digital signal processing (DSP) hardware accelerators; Section 9.5 presents conclusion; Section 9.6 provides some exercise and questions for readers. © The Institution of Engineering and Technology 2021.en_US
dc.language.isoenen_US
dc.publisherInstitution of Engineering and Technologyen_US
dc.sourceSecured Hardware Accelerators for DSP and Image Processing Applicationsen_US
dc.titleStructural transformation-based obfuscation using pseudo-operation mixing for securing data-intensive IP coresen_US
dc.typeBook Chapteren_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: