Название: Behavioral Synthesis for Hardware Security Автор: Srinivas Katkoori, Sheikh Ariful Islam Издательство: Springer Год: 2022 Страниц: 397 Язык: английский Формат: pdf (true) Размер: 12.3 MB
This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking.
Today, behavioral synthesis tools are widely used in industry to routinely design billion-transistor complex integrated circuits. While there are several knobs available in these tools for area, power, and performance optimization, none exist for automatically incorporating security in a design. The primary reason for this state of affairs is that the problem of hardware security is not yet well understood. The problem inherently is a difficult problem, for example, there is no metric to measure the level of security, unlike those available for area, power, and performance.
There is a large and active community of hardware security researchers addressing the secure design problem at lower levels of design abstraction, namely at physical and gate levels. Relatively speaking, the number of research groups working at higher levels of abstractions is low. The main reason is that the knowledge base built at the lower levels is quintessential to address the problem reliably at the higher levels (as was the case with the area, power, and performance optimization).
This edited book provides a snapshot of the ongoing hardware security research at the register-transfer level and above. The intended audience are the academic researchers actively conducting research in the area as well as those who intend to work in this area. Further, the designers in the semiconductor industry can benefit by understanding how one could address the problem at higher levels. The book can also be used in undergraduate or graduate advanced hardware security elective.
Provides a single-source reference to behavioral synthesis for hardware security; Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations; Includes behavioral synthesis techniques for intellectual property protection.
1. Introduction and Background Part I. Hardware IP Protection Through Obfuscation 2. Behavioral Synthesis of Key-Obfuscated RTL IP 3. Source Code Obfuscation of Behavioral IPs: Challenges and Solutions 4. Hardware IP Protection Using Register Transfer Level Locking and Obfuscation of Control and Data Flow 5. Protecting Behavioral IPs During Design Time: Key-Based Obfuscation Techniques for HLS in the Cloud 6. Protecting Hardware IP Cores During High-Level Synthesis Part II. Hardware IP Protection Through Watermarking and State Encoding 7. Hardware (IP) Watermarking During Behavioral Synthesis 8. Encoding of Finite-State Controllers for Graded Security and Power 9. State Encoding Based Watermarking of Sequential Circuits Using Hybridized Darwinian Genetic Algorithm Part III. Hardware Trojan: Modeling, Localization, and Defense 10. Hardware Trojan Localization: Modeling and Empirical Approach 11. Defense Against Hardware Trojan Collusion in MPSoCs 12. A Framework for Detecting Hardware Trojans in RTL Using Artificial Immune Systems Part IV. Side-Channel Defense via Behavioral Synthesis 13. High-Level Synthesis for Minimizing Power Side-Channel Information Leakage 14. S*FSMs for Reduced Information Leakage: Power Side Channel Protection Through Secure Encoding 15. Generation and Verification of Timing Attack Resilient Schedules During the High-Level Synthesis of Integrated Circuits 16. Integrating Information Flow Tracking into High-Level Synthesis Design Flow
Скачать Behavioral Synthesis for Hardware Security
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.