Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4671
Title: Secure Information Processing during System-Level: Exploration of an Optimized Trojan Secured Datapath for CDFGs during HLS Based on User Constraints
Authors: Sengupta, Anirban
Keywords: Application specific integrated circuits;Data flow analysis;Data flow graphs;Flow graphs;Graphic methods;Hardware;Hardware security;High level synthesis;Information science;Information systems;Nanoelectronics;Natural resources exploration;Particle swarm optimization (PSO);Programmable logic controllers;Reconfigurable hardware;System-on-chip;3PIP;Control data flow graphs;Design space exploration;Intellectual property cores;loop;Optimized combinations;System on chip design;unrolling;Integrated circuit design
Issue Date: 2016
Publisher: Institute of Electrical and Electronics Engineers Inc.
Citation: Sengupta, A., & Bhadauria, S. (2016). Secure information processing during system-level: Exploration of an optimized trojan secured datapath for CDFGs during HLS based on user constraints. Paper presented at the Proceedings - 2015 IEEE International Symposium on Nanoelectronic and Information Systems, iNIS 2015, 1-6. doi:10.1109/iNIS.2015.42
Abstract: Globalization of the System-on-Chip (SoC) design process poses a serious security alarm for SoC integrators, due to involvement of untrustworthy third party (3P) vendors supplying intellectual property (IP) cores. In this paper, a novel methodology for design space exploration in high level synthesis (HLS) is presented for loop based control data flow graphs (CDFG), which provides secure information processing against hardware Trojan in 3PIPs. The proposed approach performs this system level protection by exploration of an optimized combination of Trojan secured dual modular redundant (DMR) data path and loop unrolling factor (U) by employing a novel particle swarm encoding scheme. Further, the approach also presents a novel technique for efficient exploration of vendor allocation procedure for hardware capable of Trojan detection. Finally, the approach presents a novel area-delay tradeoff during exploration of Trojan secured data path and unrolling factor. Results indicated an average improvement in Quality of Results (QoR) of 12% compared to a similar prior research. © 2015 IEEE.
URI: https://doi.org/10.1109/iNIS.2015.42
https://dspace.iiti.ac.in/handle/123456789/4671
ISBN: 9781467396912
Type of Material: Conference Paper
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: