Abstract
Emerging technologies such as the Internet of Things (IoT) heavily rely on hardware security for data and privacy protection. However, constantly increasing integration complexity requires automatic synthesis to maintain the pace of innovation. We introduce the first High-Level Synthesis (HLS) flow that produces a security enhanced hardware design to directly prevent Hardware Trojan Horse (HTH) injection by a malicious foundry. Through analysis of entropy loss and criticality decay, the presented algorithms implement highly efficient resource-targeted information dispersion to counter HTH insertion. The flow is evaluated on existing HLS benchmarks and a new IoT-specific benchmark and shows significant resource savings.
Original language | English |
---|---|
Title of host publication | 53rd ACM/IEEE Design Automation Conference 2016 |
Publisher | Association for Computing Machinery (ACM) |
Pages | 1-6 |
Number of pages | 6 |
ISBN (Electronic) | 9781450342360, 9781467387293 |
ISBN (Print) | 9781467387309 |
DOIs | |
Publication status | Published - Jun 2016 |
Event | 53nd ACM/EDAC/IEEE Design Automation Conference, DAC 2016 - Austin, United States Duration: 5 Jun 2016 → 9 Jun 2016 https://dl.acm.org/doi/proceedings/10.1145/2897937 (Link to conference proceedings) https://ieeexplore.ieee.org/xpl/conhome/7502236/proceeding |
Publication series
Name | Proceedings of ACM/IEEE Design Automation Conference |
---|---|
ISSN (Print) | 0738-100X |
Conference
Conference | 53nd ACM/EDAC/IEEE Design Automation Conference, DAC 2016 |
---|---|
Country/Territory | United States |
City | Austin |
Period | 5/06/16 → 9/06/16 |
Internet address |
|
User-Defined Keywords
- High-Level Synthesis
- Security
- Hardware Trojans