Behavioral Synthesis for Hardware Security

Behavioral Synthesis for Hardware Security [electronic resource] / edited by Srinivas Katkoori, Sheikh Ariful Islam. - 1st ed. 2022. - XV, 398 p. 154 illus., 118 illus. in color. online resource.

Introduction -- Background -- Techniques for algorithm-level obfuscation during high-level synthesis -- High-level synthesis of key based obfuscated RTL datapaths -- RTL Hardware IP protection Using Key-Based Control and Data Flow Obfuscation -- Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility -- Behavioral synthesis techniques for intellectual property protection -- Exploring Low Cost Optimal Watermark for Reusable IP Cores During High Level Synthesis -- High-Level Synthesis for Side-Channel Defense -- On state encoding against power analysis attacks for finite state controllers -- Examining the consequences of high-level synthesis optimizations on power side-channel -- Towards a timing attack aware high-level synthesis of integrated circuits -- High-Level Synthesis with Timing-Sensitive Information Flow Enforcement -- Mitigating information leakage during critical communication using S*FSM -- Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPsThrough Security-Driven Task Scheduling -- Securing industrial control system with high level synthesis -- Conclusions and open research problems.

This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking. Provides a single-source reference to behavioral synthesis for hardware security; Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations; Includes behavioral synthesis techniques for intellectual property protection.

9783030788414

10.1007/978-3-030-78841-4 doi


Electronic circuits.
Cooperating objects (Computer systems).
Microprocessors.
Computer architecture.
Electronic Circuits and Systems.
Cyber-Physical Systems.
Processor Architectures.

TK7867-7867.5

621.3815
© 2024 IIIT-Delhi, library@iiitd.ac.in