Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4924
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSengupta, Anirbanen_US
dc.contributor.authorRathor, Mahendraen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:36:04Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:36:04Z-
dc.date.issued2019-
dc.identifier.citationSengupta, A., & Rathor, M. (2019). Security of functionally obfuscated DSP core against removal attack using SHA-512 based key encryption hardware. IEEE Access, 7, 4598-4610. doi:10.1109/ACCESS.2018.2889224en_US
dc.identifier.issn2169-3536-
dc.identifier.otherEID(2-s2.0-85058981405)-
dc.identifier.urihttps://doi.org/10.1109/ACCESS.2018.2889224-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4924-
dc.description.abstractDigital signal processing (DSP) kernel-based intellectual property (IP) core forms an integral ingredient of consumer electronics devices. Thus, protection of these IP cores against reverse engineering attack is crucial. Functional obfuscation serves as a powerful mechanism to counter this hardware threat. However, functional obfuscation methodologies for DSP cores use security logics that are not lightweight and are prone to removal attack by an adversary. This paper presents a novel security mechanism for protecting functionally obfuscated DSP core against removal attack using low-cost, low-power key encryption hardware. The proposed methodology using lightweight secure hashing algorithm (SHA-512)-based key encryption custom hardware reconfigures the key-bits (resulting into structural reconfiguration) of the locking logic in a functionally obfuscated DSP design augmented with the complete logic synthesis of the design. This hinders the detection of the locking logic in the obfuscated design due to camouflaging. The proposed mechanism integrated with the functional obfuscation framework yielded lower power, lower gate count, and enhanced security compared with an existing approach. An average reduction of 25.86 % in gate count and power as well as the average enhancement of 43.75 % in security against removal attack was obtained in the proposed approach compared with a recent existing approach. © 2013 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceIEEE Accessen_US
dc.subjectComputer circuitsen_US
dc.subjectComputer hardwareen_US
dc.subjectCryptographyen_US
dc.subjectDigital devicesen_US
dc.subjectHardwareen_US
dc.subjectHardware securityen_US
dc.subjectIntellectual property coreen_US
dc.subjectInternet protocolsen_US
dc.subjectKeys (for locks)en_US
dc.subjectLocks (fasteners)en_US
dc.subjectLogic designen_US
dc.subjectLogic gatesen_US
dc.subjectLogic Synthesisen_US
dc.subjectReverse engineeringen_US
dc.subjectStandardsen_US
dc.subjectCustom hardwaresen_US
dc.subjectDigital signal processing (DSP)en_US
dc.subjectFunctional Obfuscationen_US
dc.subjectHashing algorithmsen_US
dc.subjectIP networksen_US
dc.subjectRemoval attacksen_US
dc.subjectSecurity mechanismen_US
dc.subjectStructural reconfigurationsen_US
dc.subjectDigital signal processingen_US
dc.titleSecurity of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption Hardwareen_US
dc.typeJournal Articleen_US
dc.rights.licenseAll Open Access, Gold-
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: