首页 > 最新文献

Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques最新文献

英文 中文
Hologram-based structural obfuscation for DSP cores 基于全息图的DSP核结构混淆
A. Sengupta, Mahendra Rathor
This chapter highlights an alternative paradigm for the design of structurally obfuscated digital signal processing (DSP) cores inspired by security hologram. Discussion on different structural-obfuscation techniques have been included in this chapter with emphasis on the algorithms used for obfuscation during design synthesis of high-level synthesis (HLS). The chapter is organized as follows: Section 8.1 introduces the importance of obfuscation for IP cores during the system-on-chip design process; Section 8.2 discusses the background on security hologram; Section 8.3 highlights the possible use of applying the hologram concept for structural obfuscation; Section 8.4 explains the hologram-based obfuscation methodology for DSP cores; Section 8.5 presents illustrative examples for hologram-based obfuscation on DSP cores; Section 8.6 discusses the process of determination of gate count for un-obfuscated and obfuscated designs; Section 8.7 presents a demonstration and examples of high-level transformation-based obfuscated DSP circuits; Section 8.8 presents design examples of un-obfuscated (baseline) DSP circuits; Section 8.9 presents analysis on case studies; Section 8.10 concludes the chapter.
本章重点介绍了受安全全息图启发的结构模糊数字信号处理(DSP)核心设计的另一种范例。本章讨论了不同的结构混淆技术,重点讨论了高级合成(HLS)设计合成过程中用于混淆的算法。本章组织如下:8.1节介绍了在片上系统设计过程中IP核混淆的重要性;第8.2节讨论了安全全息图的背景;第8.3节强调了应用全息图概念进行结构混淆的可能用途;第8.4节解释了基于全息图的DSP核心混淆方法;第8.5节给出了基于DSP内核的全息混淆的说明性示例;第8.6节讨论了确定未混淆和混淆设计的门数的过程;第8.7节给出了基于高级变换的模糊DSP电路的演示和示例;第8.8节给出了未混淆(基线)DSP电路的设计示例;第8.9节为个案分析;第8.10节结束本章。
{"title":"Hologram-based structural obfuscation for DSP cores","authors":"A. Sengupta, Mahendra Rathor","doi":"10.1049/pbcs067e_ch8","DOIUrl":"https://doi.org/10.1049/pbcs067e_ch8","url":null,"abstract":"This chapter highlights an alternative paradigm for the design of structurally obfuscated digital signal processing (DSP) cores inspired by security hologram. Discussion on different structural-obfuscation techniques have been included in this chapter with emphasis on the algorithms used for obfuscation during design synthesis of high-level synthesis (HLS). The chapter is organized as follows: Section 8.1 introduces the importance of obfuscation for IP cores during the system-on-chip design process; Section 8.2 discusses the background on security hologram; Section 8.3 highlights the possible use of applying the hologram concept for structural obfuscation; Section 8.4 explains the hologram-based obfuscation methodology for DSP cores; Section 8.5 presents illustrative examples for hologram-based obfuscation on DSP cores; Section 8.6 discusses the process of determination of gate count for un-obfuscated and obfuscated designs; Section 8.7 presents a demonstration and examples of high-level transformation-based obfuscated DSP circuits; Section 8.8 presents design examples of un-obfuscated (baseline) DSP circuits; Section 8.9 presents analysis on case studies; Section 8.10 concludes the chapter.","PeriodicalId":12559,"journal":{"name":"Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88090037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting the rights of an IP buyer using cryptosystem-based multivariable fingerprinting 利用基于密码系统的多变量指纹技术保护知识产权购买者的权利
A. Sengupta
This chapter describes a cryptosystem-based fingerprinting approach for IP cores that is employed during the register allocation phase of electronic-system level synthesis. The need for a buyer's fingerprint and its desirable features are highlighted. Further, a detailed elaboration on the fingerprint selection and encoding technique followed by the embedding process and, finally, implementation details on case studies are provided. The chapter is organized as follows: Section 6.1 discusses the various challenges in electronic system design, followed by some fingerprint basics; Section 6.2 introduces some of the prior works in this domain; Section 6.3 presents an overview of the crypto-based fingerprinting process; Section 6.4 illustrates in detail the fingerprinting approach for digital signal processing (DSP) cores; and Section 6.5 discusses the security and design cost analyses using different case studies.
本章描述了一种用于IP核的基于密码系统的指纹识别方法,该方法用于电子系统级合成的寄存器分配阶段。需要买家的指纹和其可取的特征被强调。此外,详细阐述了指纹选择和编码技术以及随后的嵌入过程,最后提供了案例研究的实现细节。本章组织如下:第6.1节讨论电子系统设计中的各种挑战,然后是一些指纹基础知识;第6.2节介绍了本领域的一些先前作品;第6.3节介绍了基于加密的指纹识别过程的概述;第6.4节详细说明了用于数字信号处理(DSP)内核的指纹识别方法;第6.5节使用不同的案例研究讨论安全性和设计成本分析。
{"title":"Protecting the rights of an IP buyer using cryptosystem-based multivariable fingerprinting","authors":"A. Sengupta","doi":"10.1049/pbcs067e_ch6","DOIUrl":"https://doi.org/10.1049/pbcs067e_ch6","url":null,"abstract":"This chapter describes a cryptosystem-based fingerprinting approach for IP cores that is employed during the register allocation phase of electronic-system level synthesis. The need for a buyer's fingerprint and its desirable features are highlighted. Further, a detailed elaboration on the fingerprint selection and encoding technique followed by the embedding process and, finally, implementation details on case studies are provided. The chapter is organized as follows: Section 6.1 discusses the various challenges in electronic system design, followed by some fingerprint basics; Section 6.2 introduces some of the prior works in this domain; Section 6.3 presents an overview of the crypto-based fingerprinting process; Section 6.4 illustrates in detail the fingerprinting approach for digital signal processing (DSP) cores; and Section 6.5 discusses the security and design cost analyses using different case studies.","PeriodicalId":12559,"journal":{"name":"Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73154285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to hardware (IP) security: forensic detective control and obfuscation of digital signal processing (DSP) cores 硬件(IP)安全概论:数字信号处理(DSP)核心的取证检测控制和混淆
A. Sengupta
This chapter introduces the reader to the concepts of hardware security as well as exposing them to the new frontiers on hardware (intellectual property (IP) core) security from the perspective of forensic detective control mechanisms and obfuscation techniques. The book explicitly emphasizes the emerging solutions in the literature on hardware security of digital signal processing (DSP) cores. This has not been covered in any book so far. The reader is expected to have some foundational knowledge of very-large scale integration (VLSI), digital hardware design flow, high-level synthesis (HLS) and optimization. The readers can use IP Core Protection and Hardware-Assisted Security for Consumer Electronics to gain some pre-knowledge in the field.
本章向读者介绍硬件安全的概念,并从取证检测控制机制和混淆技术的角度向他们介绍硬件(知识产权(IP)核心)安全的新领域。该书明确强调在数字信号处理(DSP)核心的硬件安全的文献新兴的解决方案。到目前为止,还没有任何一本书涉及到这一点。读者应具备超大规模集成电路(VLSI)、数字硬件设计流程、高级综合(HLS)和优化的一些基础知识。读者可以使用IP核心保护和硬件辅助安全的消费电子产品,以获得在该领域的一些预知识。
{"title":"Introduction to hardware (IP) security: forensic detective control and obfuscation of digital signal processing (DSP) cores","authors":"A. Sengupta","doi":"10.1049/pbcs067e_ch1","DOIUrl":"https://doi.org/10.1049/pbcs067e_ch1","url":null,"abstract":"This chapter introduces the reader to the concepts of hardware security as well as exposing them to the new frontiers on hardware (intellectual property (IP) core) security from the perspective of forensic detective control mechanisms and obfuscation techniques. The book explicitly emphasizes the emerging solutions in the literature on hardware security of digital signal processing (DSP) cores. This has not been covered in any book so far. The reader is expected to have some foundational knowledge of very-large scale integration (VLSI), digital hardware design flow, high-level synthesis (HLS) and optimization. The readers can use IP Core Protection and Hardware-Assisted Security for Consumer Electronics to gain some pre-knowledge in the field.","PeriodicalId":12559,"journal":{"name":"Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83439509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Back Matter 回到问题
{"title":"Back Matter","authors":"","doi":"10.1049/pbcs067e_bm","DOIUrl":"https://doi.org/10.1049/pbcs067e_bm","url":null,"abstract":"","PeriodicalId":12559,"journal":{"name":"Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques","volume":"92 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91107063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic detective control using a digital signature-based watermark for IP core protection 使用基于数字签名的水印进行IP核保护的取证侦探控制
A. Sengupta
This chapter discusses forensic detective control using a digital signature-based watermark for intellectual property (IP) cores or integrated circuits (ICs). The chapter provides detailed insight on digital-signature generation and the embedding process that includes a discussion on signature-generation rules and algorithms, IP core protection using forensic detective control, methodology of implanting digital signature -based watermark constraints covertly into an IP core design and its respective design process.
本章讨论使用基于数字签名的水印对知识产权(IP)核心或集成电路(ic)进行取证检测控制。本章提供了关于数字签名生成和嵌入过程的详细见解,包括对签名生成规则和算法的讨论,使用法医侦探控制的IP核保护,将基于数字签名的水印约束隐式植入IP核设计的方法及其各自的设计过程。
{"title":"Forensic detective control using a digital signature-based watermark for IP core protection","authors":"A. Sengupta","doi":"10.1049/pbcs067e_ch3","DOIUrl":"https://doi.org/10.1049/pbcs067e_ch3","url":null,"abstract":"This chapter discusses forensic detective control using a digital signature-based watermark for intellectual property (IP) cores or integrated circuits (ICs). The chapter provides detailed insight on digital-signature generation and the embedding process that includes a discussion on signature-generation rules and algorithms, IP core protection using forensic detective control, methodology of implanting digital signature -based watermark constraints covertly into an IP core design and its respective design process.","PeriodicalId":12559,"journal":{"name":"Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques","volume":"221 7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76775488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic detective control using hardware steganography for IP core protection 使用硬件隐写技术进行IP核保护的法医侦探控制
A. Sengupta
This chapter discusses forensic detective control using hardware steganography for intellectual property (IP) cores or integrated circuits. The chapter is organized as follows: Section 2.1 introduces the utility or applications of hardware steganography; Section 2.2 discusses the threat model for which hardware steganography is applicable; Section 2.3 presents comparative study on contemporary approaches; Section 2.4 explains the IP core steganography model; Section 2.5 discusses forensic detective control using hardware steganography for digital signal processing (DSP) cores; Section 2.6 presents the design process of the hardware steganography process for DSP cores; Section 2.7 analyses security properties of hardware steganography; Section 2.8 presents an analysis and comparison of hardware steganography with watermarking for different DSP IP cores; finally, Section 2.9 concludes the chapter.
本章讨论了在知识产权(IP)内核或集成电路中使用硬件隐写术的取证检测控制。本章组织如下:第2.1节介绍硬件隐写术的实用或应用;第2.2节讨论了硬件隐写术适用的威胁模型;第2.3节是对当代方法的比较研究;第2.4节解释了IP核隐写模型;第2.5节讨论了使用数字信号处理(DSP)核心的硬件隐写术的取证检测控制;第2.6节给出了DSP内核硬件隐写过程的设计过程;2.7节分析了硬件隐写的安全特性;第2.8节给出了针对不同DSP IP核的硬件隐写与水印的分析和比较;最后,2.9节结束本章。
{"title":"Forensic detective control using hardware steganography for IP core protection","authors":"A. Sengupta","doi":"10.1049/pbcs067e_ch2","DOIUrl":"https://doi.org/10.1049/pbcs067e_ch2","url":null,"abstract":"This chapter discusses forensic detective control using hardware steganography for intellectual property (IP) cores or integrated circuits. The chapter is organized as follows: Section 2.1 introduces the utility or applications of hardware steganography; Section 2.2 discusses the threat model for which hardware steganography is applicable; Section 2.3 presents comparative study on contemporary approaches; Section 2.4 explains the IP core steganography model; Section 2.5 discusses forensic detective control using hardware steganography for digital signal processing (DSP) cores; Section 2.6 presents the design process of the hardware steganography process for DSP cores; Section 2.7 analyses security properties of hardware steganography; Section 2.8 presents an analysis and comparison of hardware steganography with watermarking for different DSP IP cores; finally, Section 2.9 concludes the chapter.","PeriodicalId":12559,"journal":{"name":"Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80359140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-phase obfuscation for fault-secured DSP circuits 故障保护DSP电路的多相混淆
A. Sengupta
This chapter discusses a multi-phase obfuscation process for fault-secured intellectual property (IP) cores during electronic system level (ESL) synthesis. A detailed elaboration on the threat model for fault-secured IP cores is followed by the use of the multi-phase obfuscation process for digital signal processing (DSP) circuits and, finally, analyses of case studies. The chapter is organized as follows: Section 7.1 discusses fault-secured IP cores and their needs, followed by different threats to fault-secured IP cores and how to solve them. Section 7.2 focuses on the differences between functional obfuscation and structural obfuscation. Section 7.3 presents the problem formulation for protecting fault-secured IP cores. Section 7.4 discusses selected contemporary structural obfuscation approaches used to date. Section 7.5 provides an overview of the multi-phase obfuscation approach followed by evaluation models used and details of the approach in the context of fault-secured DSP circuits. Section 7.6 demonstrates the multi-phase obfuscation approach on a fault-secured finite impulse response (FIR) filter. Section 7.7 presents analyses based on case studies. Section 7.8 concludes the chapter.
本章讨论了电子系统级(ESL)合成过程中故障保护知识产权(IP)核的多阶段混淆过程。详细阐述了故障保护IP核的威胁模型,随后使用数字信号处理(DSP)电路的多相混淆过程,最后分析了案例研究。本章组织如下:7.1节讨论故障保护IP核及其需求,然后讨论故障保护IP核面临的不同威胁以及如何解决这些威胁。第7.2节重点讨论功能混淆和结构混淆之间的区别。第7.3节给出了保护故障安全IP核的问题公式。第7.4节讨论了迄今为止使用的当代结构混淆方法。第7.5节提供了多阶段混淆方法的概述,然后是在故障保护DSP电路的背景下使用的评估模型和方法的细节。第7.6节演示了故障保护有限脉冲响应(FIR)滤波器的多相混淆方法。第7.7节给出了基于案例研究的分析。第7.8节结束本章。
{"title":"Multi-phase obfuscation for fault-secured DSP circuits","authors":"A. Sengupta","doi":"10.1049/pbcs067e_ch7","DOIUrl":"https://doi.org/10.1049/pbcs067e_ch7","url":null,"abstract":"This chapter discusses a multi-phase obfuscation process for fault-secured intellectual property (IP) cores during electronic system level (ESL) synthesis. A detailed elaboration on the threat model for fault-secured IP cores is followed by the use of the multi-phase obfuscation process for digital signal processing (DSP) circuits and, finally, analyses of case studies. The chapter is organized as follows: Section 7.1 discusses fault-secured IP cores and their needs, followed by different threats to fault-secured IP cores and how to solve them. Section 7.2 focuses on the differences between functional obfuscation and structural obfuscation. Section 7.3 presents the problem formulation for protecting fault-secured IP cores. Section 7.4 discusses selected contemporary structural obfuscation approaches used to date. Section 7.5 provides an overview of the multi-phase obfuscation approach followed by evaluation models used and details of the approach in the context of fault-secured DSP circuits. Section 7.6 demonstrates the multi-phase obfuscation approach on a fault-secured finite impulse response (FIR) filter. Section 7.7 presents analyses based on case studies. Section 7.8 concludes the chapter.","PeriodicalId":12559,"journal":{"name":"Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75688219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protection of fault-secured IP cores using digital signature-based watermarks 使用基于数字签名的水印保护故障安全IP核
A. Sengupta
This chapter discusses forensic detective control using digital signature-based watermarks for fault-secured digital signal processing (DSP) cores or integrated circuits. The chapter provides detailed insight on the utility of the digital signature process for fault-secured DSP cores, which is an extension of Chapter 3. This chapter includes a discussion on transient fault security, generating loop unrolled control data flow graphs representing DSP cores, fault-secured IP core protection using forensic detective control of a digital signature, the methodology of implanting digital signature - watermarking constraints covertly into an IP core design, and the respective design process. The chapter is organized as follows: Section 4.1 introduces the background to IP cores and their countermeasures as well as the background on fault-secured IP cores; Section 4.2 discusses the threat model for which a digital-signature approach is applicable; Section 4.3 provides a discussion on contemporary IP core-protection approaches for DSP cores; Section 4.4 explains forensic detective control using a digital signature-based watermark; Section 4.5 presents a case study of the digital signature process for securing fault-secured FIR filters; Section 4.6 presents an analysis and comparison of digital signature-based watermarks for various fault-secured DSP cores; Section 4.7 concludes the chapter.
本章讨论了基于数字签名的水印在故障安全数字信号处理(DSP)核心或集成电路中的取证检测控制。本章提供了对故障保护DSP内核的数字签名过程的实用程序的详细见解,这是第3章的扩展。本章包括对瞬态故障安全的讨论,生成代表DSP核心的循环展开控制数据流图,使用数字签名的法医检测控制的故障安全IP核保护,将数字签名-水印约束隐蔽地植入IP核设计的方法,以及各自的设计过程。本章组织如下:4.1节介绍了IP核的背景和对策,以及故障保护IP核的背景;第4.2节讨论了数字签名方法适用的威胁模型;第4.3节讨论了DSP核的当代IP核保护方法;第4.4节解释了使用基于数字签名的水印的取证检测控制;第4.5节介绍了保护故障保护FIR滤波器的数字签名过程的案例研究;第4.6节给出了各种故障保护DSP核的基于数字签名的水印的分析和比较;第4.7节结束本章。
{"title":"Protection of fault-secured IP cores using digital signature-based watermarks","authors":"A. Sengupta","doi":"10.1049/pbcs067e_ch4","DOIUrl":"https://doi.org/10.1049/pbcs067e_ch4","url":null,"abstract":"This chapter discusses forensic detective control using digital signature-based watermarks for fault-secured digital signal processing (DSP) cores or integrated circuits. The chapter provides detailed insight on the utility of the digital signature process for fault-secured DSP cores, which is an extension of Chapter 3. This chapter includes a discussion on transient fault security, generating loop unrolled control data flow graphs representing DSP cores, fault-secured IP core protection using forensic detective control of a digital signature, the methodology of implanting digital signature - watermarking constraints covertly into an IP core design, and the respective design process. The chapter is organized as follows: Section 4.1 introduces the background to IP cores and their countermeasures as well as the background on fault-secured IP cores; Section 4.2 discusses the threat model for which a digital-signature approach is applicable; Section 4.3 provides a discussion on contemporary IP core-protection approaches for DSP cores; Section 4.4 explains forensic detective control using a digital signature-based watermark; Section 4.5 presents a case study of the digital signature process for securing fault-secured FIR filters; Section 4.6 presents an analysis and comparison of digital signature-based watermarks for various fault-secured DSP cores; Section 4.7 concludes the chapter.","PeriodicalId":12559,"journal":{"name":"Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73868349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security of functionally obfuscated DSP cores 功能混淆DSP核的安全性
A. Sengupta, Mahendra Rathor
This chapter discusses the security of functionally obfuscated digital signal processing (DSP) cores. Some of the most prominent aspects of this chapter include descriptions of the attack models, points of vulnerability for launching reverse engineering (RE), security properties of the functional-obfuscation process, security against removal attack in the context of DSP cores, hardware-design methods of various state-of-the-art security solutions and a comparative perspective of different approaches used in the context of DSP cores.
本章讨论功能模糊数字信号处理(DSP)核心的安全性。本章的一些最突出的方面包括对攻击模型的描述,启动逆向工程(RE)的漏洞点,功能混淆过程的安全属性,DSP核心环境下的移除攻击安全性,各种最先进的安全解决方案的硬件设计方法以及在DSP核心环境中使用的不同方法的比较视角。
{"title":"Security of functionally obfuscated DSP cores","authors":"A. Sengupta, Mahendra Rathor","doi":"10.1049/pbcs067e_ch9","DOIUrl":"https://doi.org/10.1049/pbcs067e_ch9","url":null,"abstract":"This chapter discusses the security of functionally obfuscated digital signal processing (DSP) cores. Some of the most prominent aspects of this chapter include descriptions of the attack models, points of vulnerability for launching reverse engineering (RE), security properties of the functional-obfuscation process, security against removal attack in the context of DSP cores, hardware-design methods of various state-of-the-art security solutions and a comparative perspective of different approaches used in the context of DSP cores.","PeriodicalId":12559,"journal":{"name":"Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90797124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-level watermark for IP protection 多级水印IP保护
A. Sengupta
The chapter describes a multi-level watermarking process for intellectual property (IP) cores that leverages the electronic-system level (ESL) and register-transfer level (RTL). A detailed elaboration is provided on the salient features of this multilevel watermarking approach followed by its encoding technique, embedding process, detection process and, finally, implementation details using case studies. The chapter is organized as follows: Section 5.1 discusses the abstraction levels of a digital design followed by some IP protection basics; Section 5.2 introduces some of the prior works in this domain; Section 5.3 presents the salient features and advantages of a multi-level watermarking process; Section 5.4 explains the signature-embedding process for digital signal processor (DSP) cores; Section 5.5 discusses the design process of a multi-level watermarked IP core using a finite impulse response (FIR) filter; Section 5.6 presents the signature detection details of a multi-level watermark; Section 5.7 presents an analysis based on case studies; Section 5.8 concludes the chapter.
本章描述了利用电子系统级(ESL)和寄存器传输级(RTL)的知识产权(IP)核的多级水印过程。详细阐述了这种多层水印方法的显著特征,然后是其编码技术,嵌入过程,检测过程,最后是使用案例研究的实现细节。本章组织如下:第5.1节讨论了数字设计的抽象级别,然后是一些知识产权保护基础知识;第5.2节介绍了本领域之前的一些作品;第5.3节介绍了多级水印过程的显著特征和优势;第5.4节解释了数字信号处理器(DSP)内核的签名嵌入过程;第5.5节讨论了使用有限脉冲响应(FIR)滤波器的多级水印IP核的设计过程;第5.6节给出了多级水印的签名检测细节;第5.7节给出了基于案例研究的分析;第5.8节结束本章。
{"title":"Multi-level watermark for IP protection","authors":"A. Sengupta","doi":"10.1049/pbcs067e_ch5","DOIUrl":"https://doi.org/10.1049/pbcs067e_ch5","url":null,"abstract":"The chapter describes a multi-level watermarking process for intellectual property (IP) cores that leverages the electronic-system level (ESL) and register-transfer level (RTL). A detailed elaboration is provided on the salient features of this multilevel watermarking approach followed by its encoding technique, embedding process, detection process and, finally, implementation details using case studies. The chapter is organized as follows: Section 5.1 discusses the abstraction levels of a digital design followed by some IP protection basics; Section 5.2 introduces some of the prior works in this domain; Section 5.3 presents the salient features and advantages of a multi-level watermarking process; Section 5.4 explains the signature-embedding process for digital signal processor (DSP) cores; Section 5.5 discusses the design process of a multi-level watermarked IP core using a finite impulse response (FIR) filter; Section 5.6 presents the signature detection details of a multi-level watermark; Section 5.7 presents an analysis based on case studies; Section 5.8 concludes the chapter.","PeriodicalId":12559,"journal":{"name":"Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques","volume":"124 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87867460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1