Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/4982
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sengupta, Anirban | en_US |
dc.contributor.author | Roy, Dipanjan | en_US |
dc.date.accessioned | 2022-03-17T01:00:00Z | - |
dc.date.accessioned | 2022-03-17T15:36:19Z | - |
dc.date.available | 2022-03-17T01:00:00Z | - |
dc.date.available | 2022-03-17T15:36:19Z | - |
dc.date.issued | 2017 | - |
dc.identifier.citation | Sengupta, A., & Roy, D. (2017). Protecting IP core during architectural synthesis using HLT-based obfuscation. Electronics Letters, 53(13), 849-851. doi:10.1049/el.2017.1329 | en_US |
dc.identifier.issn | 0013-5194 | - |
dc.identifier.other | EID(2-s2.0-85021255639) | - |
dc.identifier.uri | https://doi.org/10.1049/el.2017.1329 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/4982 | - |
dc.description.abstract | For protecting an intellectual property (IP) core, it must be harder to reverse engineer. Structural obfuscation can play an important role in achieving this goal. A novel structural obfuscation methodology during architectural synthesis using multiple compiler-based highlevel transformations (HLTs) that yield functionally equivalent designs (data flow graphs) which are camouflaged in identity is proposed. The proposed obfuscation methodology is driven through a number of HLT techniques such as redundant operation elimination, logic transformation and tree height transformation. In addition to performing obfuscation, performing area-delay tradeoff during exploring low-cost obfuscated design is also possible using these HLT techniques in the proposed methodology. Owing to multiple stages of HLT incorporated in the proposed approach during obfuscation, it yields a highly robust design which on integration with particle swarm optimisation-based exploration framework produced low-cost obfuscated IP designs. Results of the proposed approach yielded an enhancement in strength of obfuscation of 20.19% and reduction in obfuscated design cost of 59.66% compared with a similar approach. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institution of Engineering and Technology | en_US |
dc.source | Electronics Letters | en_US |
dc.subject | Costs | en_US |
dc.subject | Data flow analysis | en_US |
dc.subject | Data flow graphs | en_US |
dc.subject | Flow graphs | en_US |
dc.subject | Intellectual property core | en_US |
dc.subject | Particle swarm optimization (PSO) | en_US |
dc.subject | Architectural synthesis | en_US |
dc.subject | Design costs | en_US |
dc.subject | High-level transformations | en_US |
dc.subject | IP design | en_US |
dc.subject | Multiple stages | en_US |
dc.subject | Particle swarm optimisation | en_US |
dc.subject | Robust designs | en_US |
dc.subject | Tree height | en_US |
dc.subject | Integrated circuit design | en_US |
dc.title | Protecting IP core during architectural synthesis using HLT-based obfuscation | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: