High-level synthesis for security and trust

Jeyavijayan J.V. Rajendran, Huan Zhang, Ozgur Sinanoglu, Ramesh Karri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Trustworthiness of System-on-Chips (SoCs) is undermined by malicious logic (trojans) in third party intellectual properties (3PIPs). Concurrent Error Detection (CED) techniques can be adapted to detect malicious outputs generated by trojans. Further, by using a diverse set of 3PIP vendors and operation-to-3PIP-to-vendor allocation constraints, one can prevent collusions between 3PIPs from the same vendor. These security constraints to detect malicious outputs and to prevent collusion have been incorporated into the allocation step of high-level synthesis.

Original languageEnglish (US)
Title of host publicationProceedings of the 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013
Pages232-233
Number of pages2
DOIs
StatePublished - 2013
Event2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013 - Chania, Crete, Greece
Duration: Jul 8 2013Jul 10 2013

Publication series

NameProceedings of the 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013

Other

Other2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013
CountryGreece
CityChania, Crete
Period7/8/137/10/13

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'High-level synthesis for security and trust'. Together they form a unique fingerprint.

Cite this