TY - GEN
T1 - High-level synthesis for security and trust
AU - Rajendran, Jeyavijayan J.V.
AU - Zhang, Huan
AU - Sinanoglu, Ozgur
AU - Karri, Ramesh
PY - 2013
Y1 - 2013
N2 - Trustworthiness of System-on-Chips (SoCs) is undermined by malicious logic (trojans) in third party intellectual properties (3PIPs). Concurrent Error Detection (CED) techniques can be adapted to detect malicious outputs generated by trojans. Further, by using a diverse set of 3PIP vendors and operation-to-3PIP-to-vendor allocation constraints, one can prevent collusions between 3PIPs from the same vendor. These security constraints to detect malicious outputs and to prevent collusion have been incorporated into the allocation step of high-level synthesis.
AB - Trustworthiness of System-on-Chips (SoCs) is undermined by malicious logic (trojans) in third party intellectual properties (3PIPs). Concurrent Error Detection (CED) techniques can be adapted to detect malicious outputs generated by trojans. Further, by using a diverse set of 3PIP vendors and operation-to-3PIP-to-vendor allocation constraints, one can prevent collusions between 3PIPs from the same vendor. These security constraints to detect malicious outputs and to prevent collusion have been incorporated into the allocation step of high-level synthesis.
UR - http://www.scopus.com/inward/record.url?scp=84885216910&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84885216910&partnerID=8YFLogxK
U2 - 10.1109/IOLTS.2013.6604087
DO - 10.1109/IOLTS.2013.6604087
M3 - Conference contribution
AN - SCOPUS:84885216910
SN - 9781479906628
T3 - Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013
SP - 232
EP - 233
BT - Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013
T2 - 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013
Y2 - 8 July 2013 through 10 July 2013
ER -