High-level synthesis for security and trust

Jeyavijayan J.V. Rajendran, Huan Zhang, Ozgur Sinanoglu, Ramesh Karri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Trustworthiness of System-on-Chips (SoCs) is undermined by malicious logic (trojans) in third party intellectual properties (3PIPs). Concurrent Error Detection (CED) techniques can be adapted to detect malicious outputs generated by trojans. Further, by using a diverse set of 3PIP vendors and operation-to-3PIP-to-vendor allocation constraints, one can prevent collusions between 3PIPs from the same vendor. These security constraints to detect malicious outputs and to prevent collusion have been incorporated into the allocation step of high-level synthesis.

Original languageEnglish (US)
Title of host publicationProceedings of the 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013
Pages232-233
Number of pages2
DOIs
StatePublished - Oct 15 2013
Event2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013 - Chania, Crete, Greece
Duration: Jul 8 2013Jul 10 2013

Publication series

NameProceedings of the 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013

Other

Other2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013
CountryGreece
CityChania, Crete
Period7/8/137/10/13

    Fingerprint

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality

Cite this

Rajendran, J. J. V., Zhang, H., Sinanoglu, O., & Karri, R. (2013). High-level synthesis for security and trust. In Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013 (pp. 232-233). [6604087] (Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013). https://doi.org/10.1109/IOLTS.2013.6604087