Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4984
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSengupta, Anirbanen_US
dc.contributor.authorRoy, Dipanjanen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:36:20Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:36:20Z-
dc.date.issued2017-
dc.identifier.citationSengupta, A., Roy, D., & Bhadauria, S. (2017). Low cost optimized trojan secured schedule at behavioral level for single & nested loop control data flow graphs (invited paper). Integration, the VLSI Journal, 58, 378-389. doi:10.1016/j.vlsi.2016.09.007en_US
dc.identifier.issn0167-9260-
dc.identifier.otherEID(2-s2.0-85002369547)-
dc.identifier.urihttps://doi.org/10.1016/j.vlsi.2016.09.007-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4984-
dc.description.abstractInternet of Things (IoT) powered by high level synthesis (HLS) provides huge opportunity of progress in the area of hardware design. However, the present era of hardware design involves globalization which poses security threat to the design integrators that rely on third party intellectual property (IP) cores for increasing design productivity at reduced design time. This paper presents for the first time in the literature, a low cost optimized hardware Trojan secured HLS approach for hardware (or application specific core) designs that is based on single or nested loop control data flow graphs (CDFG) applications. The paper presents multiple novel vendor allocation schemes (each with its own attribute of delay and area) as security constraint that yield Trojan secured schedules at behavioral level. Demonstration of the proposed approach on a nested loop case study asserts our proposed theory. Results on standard benchmarks indicate significant reduction in final solution cost compared to a similar approach. © 2016 Elsevier B.V.en_US
dc.language.isoenen_US
dc.publisherElsevier B.V.en_US
dc.sourceIntegration, the VLSI Journalen_US
dc.subjectCostsen_US
dc.subjectData flow analysisen_US
dc.subjectData flow graphsen_US
dc.subjectData transferen_US
dc.subjectFlow graphsen_US
dc.subjectGraphic methodsen_US
dc.subjectHardwareen_US
dc.subjectHigh level synthesisen_US
dc.subjectInternet of thingsen_US
dc.subjectInternet protocolsen_US
dc.subjectMalwareen_US
dc.subjectDesign productivityen_US
dc.subjectIntellectual property coresen_US
dc.subjectInternet of Things (IOT)en_US
dc.subjectLoop, CDFGsen_US
dc.subjectLow costsen_US
dc.subjectSecurityen_US
dc.subjectSecurity constrainten_US
dc.subjectTrojansen_US
dc.subjectHardware securityen_US
dc.titleLow cost optimized Trojan secured schedule at behavioral level for single & Nested loop control data flow graphs (Invited Paper)en_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: