Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/4527
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sengupta, Anirban | en_US |
dc.contributor.author | Rathor, Mahendra | en_US |
dc.date.accessioned | 2022-03-17T01:00:00Z | - |
dc.date.accessioned | 2022-03-17T15:34:46Z | - |
dc.date.available | 2022-03-17T01:00:00Z | - |
dc.date.available | 2022-03-17T15:34:46Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Sengupta, A., & Rathor, M. (2021). Structural transformation-based obfuscation using pseudo-operation mixing for securing data-intensive IP cores. Secured hardware accelerators for DSP and image processing applications (pp. 339-3356) | en_US |
dc.identifier.isbn | 9781839533068 | - |
dc.identifier.other | EID(2-s2.0-85114561317) | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/4527 | - |
dc.description.abstract | The chapter describes a structural transformation-based obfuscation approach using pseudo-operation mixing for securing data-intensive cores or hardware accelerators. The presented approach is based on pseudo-operation mixing algorithm that attains significant structural obscurity in the design to enable unobviousness without affecting the correct functionality. The chapter is organized as follows: Section 9.1 discusses about the introduction of the chapter; Section 9.2 describes the structural transformation-based obfuscation methodology; Section 9.3 presents pseudo operation mixing based structural obfuscation (POM-SO) tool that is capable of performing pseudooperation mixing-based structural obfuscation (SOB); Section 9.4 presents analysis of case studies in terms of security and design cost, especially focusing on digital signal processing (DSP) hardware accelerators; Section 9.5 presents conclusion; Section 9.6 provides some exercise and questions for readers. © The Institution of Engineering and Technology 2021. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institution of Engineering and Technology | en_US |
dc.source | Secured Hardware Accelerators for DSP and Image Processing Applications | en_US |
dc.title | Structural transformation-based obfuscation using pseudo-operation mixing for securing data-intensive IP cores | en_US |
dc.type | Book Chapter | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: