Improving Power amp; Latency Metrics for Hardware Trojan Detection During High Level Synthesis
Title | Improving Power amp; Latency Metrics for Hardware Trojan Detection During High Level Synthesis |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Shathanaa, R., Ramasubramanian, N. |
Conference Name | 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) |
Date Published | July 2018 |
Publisher | IEEE |
ISBN Number | 978-1-5386-4430-0 |
Keywords | adders, Benchmark testing, cuckoo search algorithm, datapath resource allocation, Design Space Exploration, design space exploration process, design-for-trust techniques, Hardware, hardware trojan, hardware Trojan detection, high level synthesis, integrated chip design, integrated circuit design, integrated circuits, invasive software, latency metrics, Mathematical model, microprocessor chips, power consumption, power metrics, pubcrawl, resilience, Resiliency, resource allocation, Scalability, secure IC design process, semiconductor industry, Space exploration, third party IP cores, Trojan horses, Unroll Factor, work factor metrics |
Abstract | The globalization and outsourcing of the semiconductor industry has raised serious concerns about the trustworthiness of the hardware. Importing Third Party IP cores in the Integrated Chip design has opened gates for new form of attacks on hardware. Hardware Trojans embedded in Third Party IPs has necessitated the need for secure IC design process. Design-for-Trust techniques aimed at detection of Hardware Trojans come with overhead in terms of area, latency and power consumption. In this work, we present a Cuckoo Search algorithm based Design Space Exploration process for finding low cost hardware solutions during High Level Synthesis. The exploration is conducted with respect to datapath resource allocation for single and nested loops. The proposed algorithm is compared with existing Hardware Trojan detection mechanisms and experimental results show that the proposed algorithm is able to achieve 3x improvement in Cost when compared existing algorithms. |
URL | https://ieeexplore.ieee.org/document/8494102 |
DOI | 10.1109/ICCCNT.2018.8494102 |
Citation Key | shathanaa_improving_2018 |
- Mathematical model
- work factor metrics
- Unroll Factor
- Trojan horses
- third party IP cores
- Space exploration
- semiconductor industry
- secure IC design process
- Scalability
- resource allocation
- Resiliency
- resilience
- pubcrawl
- power metrics
- power consumption
- microprocessor chips
- adders
- latency metrics
- invasive software
- integrated circuits
- integrated circuit design
- integrated chip design
- high level synthesis
- hardware Trojan detection
- hardware trojan
- Hardware
- design-for-trust techniques
- design space exploration process
- Design Space Exploration
- datapath resource allocation
- cuckoo search algorithm
- Benchmark testing