Multi-phase obfuscation for fault-secured DSP circuits

A. Sengupta
{"title":"Multi-phase obfuscation for fault-secured DSP circuits","authors":"A. Sengupta","doi":"10.1049/pbcs067e_ch7","DOIUrl":null,"url":null,"abstract":"This chapter discusses a multi-phase obfuscation process for fault-secured intellectual property (IP) cores during electronic system level (ESL) synthesis. A detailed elaboration on the threat model for fault-secured IP cores is followed by the use of the multi-phase obfuscation process for digital signal processing (DSP) circuits and, finally, analyses of case studies. The chapter is organized as follows: Section 7.1 discusses fault-secured IP cores and their needs, followed by different threats to fault-secured IP cores and how to solve them. Section 7.2 focuses on the differences between functional obfuscation and structural obfuscation. Section 7.3 presents the problem formulation for protecting fault-secured IP cores. Section 7.4 discusses selected contemporary structural obfuscation approaches used to date. Section 7.5 provides an overview of the multi-phase obfuscation approach followed by evaluation models used and details of the approach in the context of fault-secured DSP circuits. Section 7.6 demonstrates the multi-phase obfuscation approach on a fault-secured finite impulse response (FIR) filter. Section 7.7 presents analyses based on case studies. Section 7.8 concludes the chapter.","PeriodicalId":12559,"journal":{"name":"Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques","volume":"12 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/pbcs067e_ch7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

This chapter discusses a multi-phase obfuscation process for fault-secured intellectual property (IP) cores during electronic system level (ESL) synthesis. A detailed elaboration on the threat model for fault-secured IP cores is followed by the use of the multi-phase obfuscation process for digital signal processing (DSP) circuits and, finally, analyses of case studies. The chapter is organized as follows: Section 7.1 discusses fault-secured IP cores and their needs, followed by different threats to fault-secured IP cores and how to solve them. Section 7.2 focuses on the differences between functional obfuscation and structural obfuscation. Section 7.3 presents the problem formulation for protecting fault-secured IP cores. Section 7.4 discusses selected contemporary structural obfuscation approaches used to date. Section 7.5 provides an overview of the multi-phase obfuscation approach followed by evaluation models used and details of the approach in the context of fault-secured DSP circuits. Section 7.6 demonstrates the multi-phase obfuscation approach on a fault-secured finite impulse response (FIR) filter. Section 7.7 presents analyses based on case studies. Section 7.8 concludes the chapter.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
故障保护DSP电路的多相混淆
本章讨论了电子系统级(ESL)合成过程中故障保护知识产权(IP)核的多阶段混淆过程。详细阐述了故障保护IP核的威胁模型,随后使用数字信号处理(DSP)电路的多相混淆过程,最后分析了案例研究。本章组织如下:7.1节讨论故障保护IP核及其需求,然后讨论故障保护IP核面临的不同威胁以及如何解决这些威胁。第7.2节重点讨论功能混淆和结构混淆之间的区别。第7.3节给出了保护故障安全IP核的问题公式。第7.4节讨论了迄今为止使用的当代结构混淆方法。第7.5节提供了多阶段混淆方法的概述,然后是在故障保护DSP电路的背景下使用的评估模型和方法的细节。第7.6节演示了故障保护有限脉冲响应(FIR)滤波器的多相混淆方法。第7.7节给出了基于案例研究的分析。第7.8节结束本章。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Protecting the rights of an IP buyer using cryptosystem-based multivariable fingerprinting Protection of fault-secured IP cores using digital signature-based watermarks Multi-phase obfuscation for fault-secured DSP circuits Forensic detective control using a digital signature-based watermark for IP core protection Forensic detective control using hardware steganography for IP core protection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1