Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4671
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSengupta, Anirbanen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:07Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:07Z-
dc.date.issued2016-
dc.identifier.citationSengupta, A., & Bhadauria, S. (2016). Secure information processing during system-level: Exploration of an optimized trojan secured datapath for CDFGs during HLS based on user constraints. Paper presented at the Proceedings - 2015 IEEE International Symposium on Nanoelectronic and Information Systems, iNIS 2015, 1-6. doi:10.1109/iNIS.2015.42en_US
dc.identifier.isbn9781467396912-
dc.identifier.otherEID(2-s2.0-84966533775)-
dc.identifier.urihttps://doi.org/10.1109/iNIS.2015.42-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4671-
dc.description.abstractGlobalization of the System-on-Chip (SoC) design process poses a serious security alarm for SoC integrators, due to involvement of untrustworthy third party (3P) vendors supplying intellectual property (IP) cores. In this paper, a novel methodology for design space exploration in high level synthesis (HLS) is presented for loop based control data flow graphs (CDFG), which provides secure information processing against hardware Trojan in 3PIPs. The proposed approach performs this system level protection by exploration of an optimized combination of Trojan secured dual modular redundant (DMR) data path and loop unrolling factor (U) by employing a novel particle swarm encoding scheme. Further, the approach also presents a novel technique for efficient exploration of vendor allocation procedure for hardware capable of Trojan detection. Finally, the approach presents a novel area-delay tradeoff during exploration of Trojan secured data path and unrolling factor. Results indicated an average improvement in Quality of Results (QoR) of 12% compared to a similar prior research. © 2015 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceProceedings - 2015 IEEE International Symposium on Nanoelectronic and Information Systems, iNIS 2015en_US
dc.subjectApplication specific integrated circuitsen_US
dc.subjectData flow analysisen_US
dc.subjectData flow graphsen_US
dc.subjectFlow graphsen_US
dc.subjectGraphic methodsen_US
dc.subjectHardwareen_US
dc.subjectHardware securityen_US
dc.subjectHigh level synthesisen_US
dc.subjectInformation scienceen_US
dc.subjectInformation systemsen_US
dc.subjectNanoelectronicsen_US
dc.subjectNatural resources explorationen_US
dc.subjectParticle swarm optimization (PSO)en_US
dc.subjectProgrammable logic controllersen_US
dc.subjectReconfigurable hardwareen_US
dc.subjectSystem-on-chipen_US
dc.subject3PIPen_US
dc.subjectControl data flow graphsen_US
dc.subjectDesign space explorationen_US
dc.subjectIntellectual property coresen_US
dc.subjectloopen_US
dc.subjectOptimized combinationsen_US
dc.subjectSystem on chip designen_US
dc.subjectunrollingen_US
dc.subjectIntegrated circuit designen_US
dc.titleSecure Information Processing during System-Level: Exploration of an Optimized Trojan Secured Datapath for CDFGs during HLS Based on User Constraintsen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: