Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4985
Title: TL-HLS: Methodology for Low Cost Hardware Trojan Security Aware Scheduling with Optimal Loop Unrolling Factor during High Level Synthesis
Authors: Sengupta, Anirban
Keywords: Costs;Data flow analysis;Data flow graphs;Graphic methods;High level synthesis;Intellectual property;Particle swarm optimization (PSO);Control data flow graphs;Delay constraints;Design solutions;Encoding schemes;Loop unrolling;Low cost hardware;Particle swarm optimization algorithm;Trojans;Hardware security
Issue Date: 2017
Publisher: Institute of Electrical and Electronics Engineers Inc.
Citation: Sengupta, A., Bhadauria, S., & Mohanty, S. P. (2017). TL-HLS: Methodology for low cost hardware trojan security aware scheduling with optimal loop unrolling factor during high level synthesis. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36(4), 655-668. doi:10.1109/TCAD.2016.2597232
Abstract: Security against hardware Trojan that is capable to change the computational output value is accomplished by employing dual modular redundant (DMR) schedule during high level synthesis (HLS). However, building a DMR for Trojan security is nontrivial and incurs extra delay and hardware. This paper proposes a novel HLS methodology for constraint driven low cost hardware Trojan secured DMR schedule design for loop-based control data flow graphs (CDFGs). Proposed approach simultaneously explores an optimal schedule and optimal loop unrolling factor (U) combination for a low cost Trojan security aware DMR schedule. As a specific example, proposed low cost Trojan secured HLS approach relies on particle swarm optimization algorithm to explore optimized Trojan secured schedule with optimal unrolling that provides security against specific Trojan (causing change in computational output) within user provided area and delay constraints. The novel contributions of this paper are, first an exploration of a low cost Trojan security aware HLS solution for loop-based CDFGs; second, proposed encoding scheme for representing design solution comprising candidate schedule resources, candidate loop unrolling factor and candidate vendor allocation information; third, a process for exploring the a low cost vendor assignment that provides Trojan security; finally, experimental results over the standard benchmark that indicates an average reduction in final cost of 12% compared to recent approach. © 1982-2012 IEEE.
URI: https://doi.org/10.1109/TCAD.2016.2597232
https://dspace.iiti.ac.in/handle/123456789/4985
ISSN: 0278-0070
Type of Material: Journal Article
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: