Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4989
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSengupta, Anirbanen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:36:22Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:36:22Z-
dc.date.issued2017-
dc.identifier.citationSengupta, A., Bhadauria, S., & Mohanty, S. P. (2017). Low-cost security aware HLS methodology. IET Computers and Digital Techniques, 11(2), 68-79. doi:10.1049/iet-cdt.2016.0014en_US
dc.identifier.issn1751-8601-
dc.identifier.otherEID(2-s2.0-85013970557)-
dc.identifier.urihttps://doi.org/10.1049/iet-cdt.2016.0014-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4989-
dc.description.abstractOwing to massive complexity of modern digital integrated circuits (ICs) disabling complete in-house development, globalisation of the design process establishes itself as an inevitable solution for faster and efficient design. However, globalisation incurs importing intellectual property (IP) cores from various third party vendors, rendering an IP susceptible to hardware threats. To provide trust and security in digital ICs within user constraints, design of a low-cost optimised dual modular redundant, through Trojan secured high-level synthesis (HLS) methodology, is crucial. This study presents exploration of a lowcost optimised HLS solution capable of handling hardware Trojan (providing security) that alters computational output. The key contributions of the study are as: (i) novel low-cost security-aware HLS approach; (ii) novel encoding for representing bacterium in the design space (comprising of candidate datapath resource configuration and vendor allocation information for Trojan secured solution); and (iii) novel exploration process of an efficient vendor allocation procedure that assists in yielding a low-cost Trojan secured schedule. Experimental results indicate significant reduction in the cost of security-aware HLS solution (82.4%) through the proposed approach compared with a recent approach. © The Institution of Engineering and Technology 2016.en_US
dc.language.isoenen_US
dc.publisherInstitution of Engineering and Technologyen_US
dc.sourceIET Computers and Digital Techniquesen_US
dc.subjectCostsen_US
dc.subjectDigital integrated circuitsen_US
dc.subjectHardwareen_US
dc.subjectHigh level synthesisen_US
dc.subjectIntegrated circuit designen_US
dc.subjectMalwareen_US
dc.subjectDesign processen_US
dc.subjectEfficient designsen_US
dc.subjectExploration processen_US
dc.subjectIn-house developmenten_US
dc.subjectResource configurationsen_US
dc.subjectThird party vendorsen_US
dc.subjectTrust and securityen_US
dc.subjectUser constraintsen_US
dc.subjectHardware securityen_US
dc.titleLow-cost security aware HLS methodologyen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: