Protecting Trojan Secured DSP cores against IP piracy using Facial Biometrics

被引:0
|
作者
Chaurasia, Rahul [1 ]
Sengupta, Anirban [1 ]
机构
[1] Indian Inst Technol Indore, Comp Sci & Engn, Indore, India
关键词
DSP cores; Trojan secured designs; facial biometric; IP piracy; counterfeiting;
D O I
10.1109/INDICON56171.2022.10039864
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper presents a hardware security methodology for protecting the Trojan secured digital signal processing (DSP) cores against the threat of intellectual property (IP) counterfeiting/piracy using facial biometric based security approach. In the proposed methodology at first, DSP designs are leveraged with Trojan detection capability by constructing the Trojan secured designs using distinct multi-vendor policy. The Trojan secured design is constructed by creating a sister unit of the original DSP design by duplicating its operations. Subsequently, the facial signature has been generated from the facial features of genuine IP owner. Finally, this generated facial signature is embedded into the design in the form of covert secret security constraints during high-level synthesis (HLS) process. Thus, the proposed approach ensures the stronger security of the target Trojan secured design against IP piracy. The security strength of the proposed methodology is measured using probability of coincidence (Pc) and the probability for an attacker to extract the exact signature combination to prove the IP ownership `P(f)'. Further, the proposed methodology incurs zero design overhead while enabling the robust protection of the Trojan secured DSP cores using facial biometric security.
引用
收藏
页数:6
相关论文
共 6 条
  • [1] Hardware Security of Digital Image Filter IP Cores against Piracy using IP Seller's Fingerprint Encrypted Amino Acid Biometric Sample
    Sengupta, Anirban
    Chaurasia, Rahul
    Anshul, Aditya
    [J]. 2023 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM, ASIANHOST, 2023,
  • [2] Secured Convolutional Layer IP Core in Convolutional Neural Network Using Facial Biometric
    Sengupta, Anirban
    Chaurasia, Rahul
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2022, 68 (03) : 291 - 306
  • [3] Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression
    Sengupta, Anirban
    Chaurasia, Rahul
    [J]. IEEE ACCESS, 2022, 10 : 50903 - 50913
  • [4] Protecting World Leader Using Facial Speaking Pattern Against Deepfakes
    Chu, Beilin
    You, Weike
    Yang, Zhen
    Zhou, Linna
    Wang, Renying
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 2078 - 2082
  • [5] A defense mechanism against hardware Trojan insertion by third-party intellectual property (IP) design blocks in AES-based secured communication system
    Noor N.Q.M.
    Daud S.M.
    [J]. International Journal of Information Technology, 2017, 9 (1) : 87 - 92
  • [6] Protecting world leaders against deep fakes using facial, gestural, and vocal mannerisms
    Bohacek, Matyas
    Farid, Hany
    [J]. PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2022, 119 (48)