Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/4989
Title: | Low-cost security aware HLS methodology |
Authors: | Sengupta, Anirban |
Keywords: | Costs;Digital integrated circuits;Hardware;High level synthesis;Integrated circuit design;Malware;Design process;Efficient designs;Exploration process;In-house development;Resource configurations;Third party vendors;Trust and security;User constraints;Hardware security |
Issue Date: | 2017 |
Publisher: | Institution of Engineering and Technology |
Citation: | Sengupta, A., Bhadauria, S., & Mohanty, S. P. (2017). Low-cost security aware HLS methodology. IET Computers and Digital Techniques, 11(2), 68-79. doi:10.1049/iet-cdt.2016.0014 |
Abstract: | Owing to massive complexity of modern digital integrated circuits (ICs) disabling complete in-house development, globalisation of the design process establishes itself as an inevitable solution for faster and efficient design. However, globalisation incurs importing intellectual property (IP) cores from various third party vendors, rendering an IP susceptible to hardware threats. To provide trust and security in digital ICs within user constraints, design of a low-cost optimised dual modular redundant, through Trojan secured high-level synthesis (HLS) methodology, is crucial. This study presents exploration of a lowcost optimised HLS solution capable of handling hardware Trojan (providing security) that alters computational output. The key contributions of the study are as: (i) novel low-cost security-aware HLS approach; (ii) novel encoding for representing bacterium in the design space (comprising of candidate datapath resource configuration and vendor allocation information for Trojan secured solution); and (iii) novel exploration process of an efficient vendor allocation procedure that assists in yielding a low-cost Trojan secured schedule. Experimental results indicate significant reduction in the cost of security-aware HLS solution (82.4%) through the proposed approach compared with a recent approach. © The Institution of Engineering and Technology 2016. |
URI: | https://doi.org/10.1049/iet-cdt.2016.0014 https://dspace.iiti.ac.in/handle/123456789/4989 |
ISSN: | 1751-8601 |
Type of Material: | Journal Article |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: