High-Level Synthesis for Security and Trust
Conference Paper
Overview
Identity
Additional Document Info
Other
View All
Overview
abstract
Trustworthiness of System-on-Chips (SoCs) is undermined by malicious logic (trojans) in third party intellectual properties (3PIPs). Concurrent Error Detection (CED) techniques can be adapted to detect malicious outputs generated by trojans. Further, by using a diverse set of 3PIP vendors and operation-to-3PIP-to-vendor allocation constraints, one can prevent collusions between 3PIPs from the same vendor. These security constraints to detect malicious outputs and to prevent collusion have been incorporated into the allocation step of high-level synthesis. 2013 IEEE.
name of conference
2013 IEEE 19th International On-Line Testing Symposium (IOLTS)