Information dispersion for Trojan defense through high-level synthesis

S. T. Choden Konigsmark, Deming Chen, Martin D. F. Wong

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

19 Citations (Scopus)


Emerging technologies such as the Internet of Things (IoT) heavily rely on hardware security for data and privacy protection. However, constantly increasing integration complexity requires automatic synthesis to maintain the pace of innovation. We introduce the first High-Level Synthesis (HLS) flow that produces a security enhanced hardware design to directly prevent Hardware Trojan Horse (HTH) injection by a malicious foundry. Through analysis of entropy loss and criticality decay, the presented algorithms implement highly efficient resource-targeted information dispersion to counter HTH insertion. The flow is evaluated on existing HLS benchmarks and a new IoT-specific benchmark and shows significant resource savings.
Original languageEnglish
Title of host publication53rd ACM/IEEE Design Automation Conference 2016
PublisherAssociation for Computing Machinery (ACM)
Number of pages6
ISBN (Electronic)9781450342360, 9781467387293
ISBN (Print)9781467387309
Publication statusPublished - Jun 2016
Event53nd ACM/EDAC/IEEE Design Automation Conference, DAC 2016 - Austin, United States
Duration: 5 Jun 20169 Jun 2016 (Link to conference proceedings)

Publication series

NameProceedings of ACM/IEEE Design Automation Conference
ISSN (Print)0738-100X


Conference53nd ACM/EDAC/IEEE Design Automation Conference, DAC 2016
Country/TerritoryUnited States
Internet address

User-Defined Keywords

  • High-Level Synthesis
  • Security
  • Hardware Trojans


Dive into the research topics of 'Information dispersion for Trojan defense through high-level synthesis'. Together they form a unique fingerprint.

Cite this