Exploration of optimal functional Trojan-resistant hardware intellectual property (IP) core designs during high level synthesis

被引:0
|
作者
Sengupta, Anirban [1 ]
Anshul, Aditya [1 ]
Chaurasia, Rahul [1 ]
机构
[1] Indian Inst Technol Indore, Dept Comp Sci & Engn, Simrol, Madhya Pradesh, India
关键词
Security; IP cores; Hardware Trojan; DSE; HLS; SPACE EXPLORATION; OPTIMIZATION; SECURITY; ALGORITHM; POWER;
D O I
10.1016/j.micpro.2023.104973
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojans that have the capability to change the computed functional output in intellectual property (IP) cores, integrated into computing systems can be a vital reliability concern in the context of correct system operation. Therefore, determining an optimal Trojan-resistant hardware design architecture that considers multi objective orthogonal parameters such as area and delay is crucial. This paper presents a novel exploration of optimal hardware IP core design methodology with Trojan defense capability (i.e., detection and isolation) during high level synthesis (HLS) that provides isolation of functional Trojan in a system design to ensure reliable and correct functional behavior. The proposed methodology is robust and provides the capability to yield the correct output value using HLS-based triple modular redundancy (TMR) logic and a distinct multivendor allocation policy. Therefore, the proposed HLS methodology can generate an optimal hardware IP core/system-onchip (SoC) design with functional Trojan defense capability. The paper presents an overall flow of the proposed methodology along with a demonstrative case study on designing optimal Trojan resistant finite impulse response filter (FIR) hardware SoC design. Results of the proposed approach are evaluated in terms of design cost, convergence time, security and optimality analysis, and comparison with prior works. The proposed approach is able to generate fully functional Trojan-resistant optimal SoC designs with minimum overhead, as evident from optimality analysis and design cost.
引用
收藏
页数:14
相关论文
共 16 条
  • [1] Exploration of optimal crypto-chain signature embedded secure JPEG-CODEC hardware IP during high level synthesis
    Anshul, Aditya
    Sengupta, Anirban
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 102
  • [2] Quadruple phase watermarking during high level synthesis for securing reusable hardware intellectual property cores
    Rathor, Mahendra
    Anshul, Aditya
    Bharath, K.
    Chaurasia, Rahul
    Sengupta, Anirban
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 105
  • [3] Improving Power & Latency Metrics for Hardware Trojan Detection during High Level Synthesis
    Shathanaa, R.
    Ramasubramanian, N.
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [4] Embedding Low Cost Optimal Watermark During High Level Synthesis for Reusable IP Core Protection
    Sengupta, Anirban
    Bhadauria, Saumya
    Mohanty, Saraju P.
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 974 - 977
  • [5] PSO based exploration of multi-phase encryption based secured image processing filter hardware IP core datapath during high level synthesis
    Anshul, Aditya
    Sengupta, Anirban
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 223
  • [6] Protecting Ownership of Reusable IP Core Generated during High Level Synthesis
    Kachave, Deepak
    Sengupta, Anirban
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL SYMPOSIUM ON NANOELECTRONIC AND INFORMATION SYSTEMS (INIS), 2016, : 80 - 82
  • [7] TL-HLS: Methodology for Low Cost Hardware Trojan Security Aware Scheduling With Optimal Loop Unrolling Factor During High Level Synthesis
    Sengupta, Anirban
    Bhadauria, Saumya
    Mohanty, Saraju P.
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (04) : 655 - 668
  • [8] HLS-IRT: Hardware Trojan Insertion through Modification of Intermediate Representation During High-Level Synthesis
    Mukherjee, Rijoy
    Ghosh, Archisman
    Chakraborty, Rajat subhra
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2024, 29 (05)
  • [9] Exploring Low Cost Optimal Watermark for Reusable IP Cores During High Level Synthesis
    Sengupta, Anirban
    Bhadauria, Saumya
    IEEE ACCESS, 2016, 4 : 2198 - 2215
  • [10] Forensic engineering for resolving ownership problem of reusable IP core generated during high level synthesis
    Sengupta, Anirban
    Kachave, Deepak
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 29 - 46