High-Level Synthesis for Security and Trust Conference Paper uri icon


  • Trustworthiness of System-on-Chips (SoCs) is undermined by malicious logic (trojans) in third party intellectual properties (3PIPs). Concurrent Error Detection (CED) techniques can be adapted to detect malicious outputs generated by trojans. Further, by using a diverse set of 3PIP vendors and operation-to-3PIP-to-vendor allocation constraints, one can prevent collusions between 3PIPs from the same vendor. These security constraints to detect malicious outputs and to prevent collusion have been incorporated into the allocation step of high-level synthesis. 2013 IEEE.

name of conference

  • 2013 IEEE 19th International On-Line Testing Symposium (IOLTS)

published proceedings

  • 2013 IEEE 19th International On-Line Testing Symposium (IOLTS)

author list (cited authors)

  • Rajendran, J., Zhang, H., Sinanoglu, O., & Karri, R.

citation count

  • 35

complete list of authors

  • Rajendran, Jeyavijayan||Zhang, Huan||Sinanoglu, Ozgur||Karri, Ramesh

publication date

  • January 2013