首页 > 最新文献

IP Core Protection and Hardware-Assisted Security for Consumer Electronics最新文献

英文 中文
Structural obfuscation of DSP cores used in CE devices 用于CE器件的DSP核的结构混淆
Pub Date : 2019-01-30 DOI: 10.1049/pbcs060e_ch7
A. Sengupta, S. Mohanty
Previous chapters, watermarking, fingerprinting, and forensic engineering have been discussed for resolving various ownership-related problems. This chapter discusses structural obfuscation approaches to thwart IP piracy and reverse engineering (RE). This approach, when effective, can save billions of dollars of revenue losses in CE and semiconductor industry. Especially, a multi-high-level transformation-based structural obfuscation process has been presented for DSP IP cores as hardware-hardening technique. The chapter is structured as follows: Section 7.2 highlights the fundamentals of obfuscation with stress on structural obfuscation; Section 7.3 discusses different compiler transformation-driven structural obfuscation methodology. Section 7.4 discusses low-cost structurally obfuscated design exploring technique. Section 7.5 demonstrates a multistage structural obfuscation technique through a motivational example. Section 7.6 presents the results of a case study.
前面的章节,水印,指纹和法医工程已经讨论了解决各种所有权相关的问题。本章讨论了阻止IP盗版和逆向工程(RE)的结构混淆方法。这种方法,如果有效,可以节省数十亿美元的收入损失在CE和半导体行业。特别是针对DSP IP核,提出了一种基于多层转换的结构混淆处理方法作为硬件硬化技术。本章的结构如下:第7.2节强调混淆的基本原理,强调结构混淆;第7.3节讨论了不同的编译器转换驱动的结构混淆方法。第7.4节讨论了低成本的结构模糊设计探索技术。第7.5节通过一个激励性的例子演示了多阶段结构混淆技术。第7.6节给出了一个案例研究的结果。
{"title":"Structural obfuscation of DSP cores used in CE devices","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/pbcs060e_ch7","DOIUrl":"https://doi.org/10.1049/pbcs060e_ch7","url":null,"abstract":"Previous chapters, watermarking, fingerprinting, and forensic engineering have been discussed for resolving various ownership-related problems. This chapter discusses structural obfuscation approaches to thwart IP piracy and reverse engineering (RE). This approach, when effective, can save billions of dollars of revenue losses in CE and semiconductor industry. Especially, a multi-high-level transformation-based structural obfuscation process has been presented for DSP IP cores as hardware-hardening technique. The chapter is structured as follows: Section 7.2 highlights the fundamentals of obfuscation with stress on structural obfuscation; Section 7.3 discusses different compiler transformation-driven structural obfuscation methodology. Section 7.4 discusses low-cost structurally obfuscated design exploring technique. Section 7.5 demonstrates a multistage structural obfuscation technique through a motivational example. Section 7.6 presents the results of a case study.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72690690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware approaches for media and information protection and authentication 媒体和信息保护和认证的硬件方法
Pub Date : 2019-01-30 DOI: 10.1049/PBCS060E_CH11
A. Sengupta, S. Mohanty
Technology scaling has allowed us to design high-performance devices with a lowpower consumption. The advent of IoT has increased the versatility of data collection and there are many different ways of collecting and transferring data over the Internet. The data that is being collected is also in different forms, that is, text, images, videos, and audios. When they are shared, for a legit use, attackers can break the security and use them for illegible purposes or claim ownership to sell them commercially. This has been the trend lately where many counterfeit products are appearing in the market. This section discusses the digital watermarking, different schemes of digital watermarking, and how a media object can be secured using a watermark. They are also not completely resistant to attacks and measures need to be taken to secure the content that is being watermarked. The chapter also presents different issues with the watermark implementations, attacks and countermeasures to those attacks on watermarking. Section 11.1 presents a broad overview of the IP protection. Section 11.2 discusses the generic overview and components of any watermark system. Section 11.3 summarizes various types of watermarks. Section 11.4 discusses various applications of watermarking. Section 11.5 presents desired characteristics of watermarks. Sections 11.6 discusses the technical challenges of the watermarking. Section 11.7 discusses hardware-based watermarking systems available in the current literature. Section 11.8 discusses about watermarking in smart vehicles. Section 11.9 discusses about medical signal authentication. Section 11.10 highlights side-channel information leakage and its countermeasures. Section 11.11 outlines various forms of attacks on watermarks and watermarking systems. Section 11.12 presents the difficulties involved in making use of them in practice.
技术扩展使我们能够以低功耗设计高性能设备。物联网的出现增加了数据收集的多功能性,并且有许多不同的方式通过互联网收集和传输数据。正在收集的数据也有不同的形式,有文本、图像、视频和音频。当它们被共享用于合法用途时,攻击者可以破坏安全性并将它们用于难以辨认的目的或声称所有权以进行商业销售。这是最近的趋势,许多假冒产品出现在市场上。本节讨论数字水印,不同的数字水印方案,以及如何使用水印保护媒体对象。它们也不能完全抵抗攻击,需要采取措施来保护被加水印的内容。本章还介绍了水印的实现、攻击以及对这些攻击的应对措施。第11.1节概述了知识产权保护。第11.2节讨论了任何水印系统的一般概述和组件。第11.3节总结了各种类型的水印。第11.4节讨论了水印的各种应用。第11.5节给出了期望的水印特性。第11.6节讨论了水印的技术挑战。第11.7节讨论了当前文献中可用的基于硬件的水印系统。第11.8节讨论了智能车辆中的水印。第11.9节讨论医疗信号认证。第11.10节重点介绍了侧信道信息泄漏及其对策。第11.11节概述了对水印和水印系统的各种形式的攻击。第11.12节介绍了在实践中使用它们所涉及的困难。
{"title":"Hardware approaches for media and information protection and authentication","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/PBCS060E_CH11","DOIUrl":"https://doi.org/10.1049/PBCS060E_CH11","url":null,"abstract":"Technology scaling has allowed us to design high-performance devices with a lowpower consumption. The advent of IoT has increased the versatility of data collection and there are many different ways of collecting and transferring data over the Internet. The data that is being collected is also in different forms, that is, text, images, videos, and audios. When they are shared, for a legit use, attackers can break the security and use them for illegible purposes or claim ownership to sell them commercially. This has been the trend lately where many counterfeit products are appearing in the market. This section discusses the digital watermarking, different schemes of digital watermarking, and how a media object can be secured using a watermark. They are also not completely resistant to attacks and measures need to be taken to secure the content that is being watermarked. The chapter also presents different issues with the watermark implementations, attacks and countermeasures to those attacks on watermarking. Section 11.1 presents a broad overview of the IP protection. Section 11.2 discusses the generic overview and components of any watermark system. Section 11.3 summarizes various types of watermarks. Section 11.4 discusses various applications of watermarking. Section 11.5 presents desired characteristics of watermarks. Sections 11.6 discusses the technical challenges of the watermarking. Section 11.7 discusses hardware-based watermarking systems available in the current literature. Section 11.8 discusses about watermarking in smart vehicles. Section 11.9 discusses about medical signal authentication. Section 11.10 highlights side-channel information leakage and its countermeasures. Section 11.11 outlines various forms of attacks on watermarks and watermarking systems. Section 11.12 presents the difficulties involved in making use of them in practice.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83870376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced encryption standard (AES) and its hardware watermarking for ownership protection 高级加密标准(AES)及其所有权保护的硬件水印
Pub Date : 2019-01-30 DOI: 10.1049/pbcs060e_ch10
A. Sengupta, S. Mohanty
In this era of consumer electronics, cyber security is one of the key challenges. Any security, privacy, or protection methods that are deployed rely on cryptography. Advance encryption standard (AES) is one of the heavily used cryptography algorithms for its advantages. This chapter is dedicated to the process of AES and its hardware design in the form of IP core. Several hardware security techniques rely on AES IP core as an important block. Additionally, since this is such an important core, its self-protection against forgery/piracy is also crucial. Thus, this chapter will also discuss about AES IP core protection using watermarking.
在这个消费电子时代,网络安全是关键挑战之一。部署的任何安全、隐私或保护方法都依赖于密码学。高级加密标准AES (advanced encryption standard, AES)以其自身的优点成为目前应用最为广泛的加密算法之一。本章主要介绍AES的实现过程及其IP核形式的硬件设计。许多硬件安全技术都依赖于AES IP核作为重要的块。此外,由于这是如此重要的核心,它的自我保护,防止伪造/盗版也至关重要。因此,本章还将讨论使用水印的AES IP核保护。
{"title":"Advanced encryption standard (AES) and its hardware watermarking for ownership protection","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/pbcs060e_ch10","DOIUrl":"https://doi.org/10.1049/pbcs060e_ch10","url":null,"abstract":"In this era of consumer electronics, cyber security is one of the key challenges. Any security, privacy, or protection methods that are deployed rely on cryptography. Advance encryption standard (AES) is one of the heavily used cryptography algorithms for its advantages. This chapter is dedicated to the process of AES and its hardware design in the form of IP core. Several hardware security techniques rely on AES IP core as an important block. Additionally, since this is such an important core, its self-protection against forgery/piracy is also crucial. Thus, this chapter will also discuss about AES IP core protection using watermarking.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88862704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symmetrical protection of DSP IP core and integrated circuits using fingerprinting and watermarking 基于指纹和水印的DSP IP核和集成电路的对称保护
Pub Date : 2019-01-30 DOI: 10.1049/pbcs060e_ch5
A. Sengupta, S. Mohanty
This chapter discusses the use of watermarking and fingerprinting for symmetrical protection of DSP IP cores and integrated circuits. Symmetrical IP core protection is a mechanism in which both seller and buyers of an IP can have signature for doubleproof of ownership and whereas significantly reducing false ownership claims.
本章讨论了利用水印和指纹技术对DSP IP核和集成电路进行对称保护。对称知识产权核心保护是一种机制,在这种机制中,知识产权的卖方和买方都可以拥有双重证明所有权的签名,同时显著减少虚假所有权声明。
{"title":"Symmetrical protection of DSP IP core and integrated circuits using fingerprinting and watermarking","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/pbcs060e_ch5","DOIUrl":"https://doi.org/10.1049/pbcs060e_ch5","url":null,"abstract":"This chapter discusses the use of watermarking and fingerprinting for symmetrical protection of DSP IP cores and integrated circuits. Symmetrical IP core protection is a mechanism in which both seller and buyers of an IP can have signature for doubleproof of ownership and whereas significantly reducing false ownership claims.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80698865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security in consumer electronics and internet of things (IoT) 消费电子产品和物联网(IoT)的安全
Pub Date : 2019-01-30 DOI: 10.1049/PBCS060E_CH2
A. Sengupta, S. Mohanty
In a typical consumer electronics generation, diverse forms of attacks exist, e.g., system security, information security, information privacy, system trustworthiness, hardware IP protection, information copyright protection. Each of the attacks have their own threats and serve different purposes. The objective of this chapter is to differentiate each of these attacks in the context of internet of things (IoT). IoT is a very hot, trending topic of research, where different devices, sensors, and computers are connected to a network, collect data, and process for different purposes. A network of devices and sensors connected to the cloud can complete many unimaginable tasks, and without the existence of cloud, almost all task would have been very difficult to achieve and complete. Since, most connectivity occurs in cloud, there is always a probability of security and privacy threats. Because all types of the different devices are connected to the internet, attackers pose a huge threat to the system. For example, if any electronic system that is responsible for home care, healthcare, running an entire city, etc., are attacked, then the consequence of this threat will be a major catastrophe.
在典型的消费电子时代,存在着各种形式的攻击,如系统安全、信息安全、信息隐私、系统可信、硬件IP保护、信息版权保护等。每种攻击都有自己的威胁,并服务于不同的目的。本章的目的是在物联网(IoT)的背景下区分每种攻击。物联网是一个非常热门的趋势研究主题,不同的设备,传感器和计算机连接到网络,收集数据,并为不同的目的进行处理。连接到云的设备和传感器网络可以完成许多难以想象的任务,如果没有云的存在,几乎所有的任务都很难实现和完成。由于大多数连接发生在云中,因此始终存在安全和隐私威胁的可能性。由于所有类型的不同设备都连接到互联网,攻击者对系统构成了巨大的威胁。例如,如果任何负责家庭护理、医疗保健、运行整个城市等的电子系统受到攻击,那么这种威胁的后果将是一场重大灾难。
{"title":"Security in consumer electronics and internet of things (IoT)","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/PBCS060E_CH2","DOIUrl":"https://doi.org/10.1049/PBCS060E_CH2","url":null,"abstract":"In a typical consumer electronics generation, diverse forms of attacks exist, e.g., system security, information security, information privacy, system trustworthiness, hardware IP protection, information copyright protection. Each of the attacks have their own threats and serve different purposes. The objective of this chapter is to differentiate each of these attacks in the context of internet of things (IoT). IoT is a very hot, trending topic of research, where different devices, sensors, and computers are connected to a network, collect data, and process for different purposes. A network of devices and sensors connected to the cloud can complete many unimaginable tasks, and without the existence of cloud, almost all task would have been very difficult to achieve and complete. Since, most connectivity occurs in cloud, there is always a probability of security and privacy threats. Because all types of the different devices are connected to the internet, attackers pose a huge threat to the system. For example, if any electronic system that is responsible for home care, healthcare, running an entire city, etc., are attacked, then the consequence of this threat will be a major catastrophe.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73205898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Introduction to IP core protection and hardware-assisted security of consumer electronics 介绍消费类电子产品的IP核保护和硬件辅助安全
Pub Date : 2019-01-30 DOI: 10.1049/pbcs060e_ch1
A. Sengupta, S. Mohanty
This chapter presents an overview of the book and discussions on topics that could serve as an introductory part toward the overall content of the book. It is assumed that the readers will have some subject knowledge on topics such as very large scale integration (VLSI), embedded systems, hardware design flow, etc., before adopting the section of this book.
本章介绍了本书的概述和对主题的讨论,这些主题可以作为本书总体内容的介绍性部分。假设读者在采用本书的章节之前,将对诸如超大规模集成电路(VLSI),嵌入式系统,硬件设计流程等主题有一些主题知识。
{"title":"Introduction to IP core protection and hardware-assisted security of consumer electronics","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/pbcs060e_ch1","DOIUrl":"https://doi.org/10.1049/pbcs060e_ch1","url":null,"abstract":"This chapter presents an overview of the book and discussions on topics that could serve as an introductory part toward the overall content of the book. It is assumed that the readers will have some subject knowledge on topics such as very large scale integration (VLSI), embedded systems, hardware design flow, etc., before adopting the section of this book.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86752009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functional obfuscation of DSP cores used in CE devices 用于CE设备的DSP核的功能混淆
Pub Date : 2019-01-30 DOI: 10.1049/PBCS060E_CH8
A. Sengupta, S. Mohanty
The previous chapter detailed many approaches for structural obfuscation but we now move forward to another class of obfuscation called “functional obfuscation.”The use of either of the techniques is the choice of design engineers. This chapter presents several methods to thwart IP piracy and RE attacks through functional obfuscation. More specifically, we will discuss IP functional locking blocks (ILBs)-based logic obfuscation for DSP cores used in CE devices as hardware hardening technique (Sengupta et al., 2018). Moreover, a PSO-based DSE is performed to generate a low-overhead, functionally obfuscated (FO) design solution for DSP cores (Sengupta and Sedaghat, 2011, 2013). The rest of the chapter is organized as follows: Section 8.2 discusses different attack scenarios and threat model. Section 8.3 explains selected functional obfuscation techniques that are available in the literature. Section 8.4 discusses the design process of functional obfuscation for DSP IP cores used in CE devices. Section 8.5 presents the security analysis of functional obfuscation methodology for DSP IP core design. Section 8.6 discusses PSO-based optimization for FO design. Section 8.7 presents analysis on case studies/test cases.
前一章详细介绍了许多结构混淆的方法,但现在我们继续讨论另一类混淆,称为“功能混淆”。使用哪一种技术是设计工程师的选择。本章介绍了几种通过功能混淆阻止IP盗版和RE攻击的方法。更具体地说,我们将讨论CE设备中使用的DSP内核的基于IP功能锁定块(ilb)的逻辑混淆作为硬件加固技术(Sengupta等人,2018)。此外,执行基于pso的DSE以生成低开销,功能混淆(FO)的DSP核心设计解决方案(Sengupta和Sedaghat, 2011年,2013年)。本章的其余部分组织如下:8.2节讨论了不同的攻击场景和威胁模型。第8.3节解释了文献中可用的功能混淆技术。第8.4节讨论了CE设备中使用的DSP IP核的功能混淆设计过程。第8.5节介绍了DSP IP核心设计的功能混淆方法的安全性分析。第8.6节讨论了基于pso的FO设计优化。第8.7节给出了对用例研究/测试用例的分析。
{"title":"Functional obfuscation of DSP cores used in CE devices","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/PBCS060E_CH8","DOIUrl":"https://doi.org/10.1049/PBCS060E_CH8","url":null,"abstract":"The previous chapter detailed many approaches for structural obfuscation but we now move forward to another class of obfuscation called “functional obfuscation.”The use of either of the techniques is the choice of design engineers. This chapter presents several methods to thwart IP piracy and RE attacks through functional obfuscation. More specifically, we will discuss IP functional locking blocks (ILBs)-based logic obfuscation for DSP cores used in CE devices as hardware hardening technique (Sengupta et al., 2018). Moreover, a PSO-based DSE is performed to generate a low-overhead, functionally obfuscated (FO) design solution for DSP cores (Sengupta and Sedaghat, 2011, 2013). The rest of the chapter is organized as follows: Section 8.2 discusses different attack scenarios and threat model. Section 8.3 explains selected functional obfuscation techniques that are available in the literature. Section 8.4 discusses the design process of functional obfuscation for DSP IP cores used in CE devices. Section 8.5 presents the security analysis of functional obfuscation methodology for DSP IP core design. Section 8.6 discusses PSO-based optimization for FO design. Section 8.7 presents analysis on case studies/test cases.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88756407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IP core and integrated circuit protection using robust watermarking 利用鲁棒水印保护IP核和集成电路
Pub Date : 2019-01-30 DOI: 10.1049/pbcs060e_ch4
A. Sengupta, S. Mohanty
This chapter discusses robust watermarking approaches for the ownership protection of hardware cores [a.k.a. intellectual property (IP) cores]. Watermarking ensures some additional attributes inserted in the hardware core such a way that it can be used to verify ownership of the hardware core when required. Robust watermarking approaches have been discussed as these are resilient to various attacks that happen in global supply chain for various reasons.
本章讨论了用于硬件核所有权保护的鲁棒水印方法。知识产权(IP)核心]。水印确保在硬件核心中插入一些附加属性,以便在需要时使用它来验证硬件核心的所有权。鲁棒水印方法已经被讨论过,因为这些方法对全球供应链中由于各种原因发生的各种攻击具有弹性。
{"title":"IP core and integrated circuit protection using robust watermarking","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/pbcs060e_ch4","DOIUrl":"https://doi.org/10.1049/pbcs060e_ch4","url":null,"abstract":"This chapter discusses robust watermarking approaches for the ownership protection of hardware cores [a.k.a. intellectual property (IP) cores]. Watermarking ensures some additional attributes inserted in the hardware core such a way that it can be used to verify ownership of the hardware core when required. Robust watermarking approaches have been discussed as these are resilient to various attacks that happen in global supply chain for various reasons.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89964886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trojan security aware DSP IP core and integrated circuits 木马安全感知DSP IP核心和集成电路
Pub Date : 2019-01-30 DOI: 10.1049/PBCS060E_ch3
A. Sengupta, S. Mohanty
This chapter discusses different security approaches to designing digital signal processing (DSP) cores that have detection capability against functional-type hardware Trojans in a global supply chain. In the current design and fabrication supply chain, design houses, circuits and system core vendors, and manufacturing houses are globally scattered. It is quite possible that Trojans can be inserted in this design and manufacturing supply chain by anyone involved at any phase. Such Trojans can give backdoors to hackers and affect the operation of the system that uses the infected hardware. In a worst case, in critical applications, such as aircrafts and medical devices, functioning can be completely stopped, causing catastrophic consequences.
本章讨论了设计数字信号处理(DSP)核心的不同安全方法,这些核心具有针对全球供应链中功能性硬件木马的检测能力。在当前的设计和制造供应链中,设计公司、电路和系统核心供应商以及制造公司遍布全球。任何人在任何阶段都有可能在设计和制造供应链中插入木马程序。这类木马可以为黑客提供后门,并影响使用受感染硬件的系统的运行。在最坏的情况下,在关键应用中,如飞机和医疗设备,功能可能完全停止,造成灾难性后果。
{"title":"Trojan security aware DSP IP core and integrated circuits","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/PBCS060E_ch3","DOIUrl":"https://doi.org/10.1049/PBCS060E_ch3","url":null,"abstract":"This chapter discusses different security approaches to designing digital signal processing (DSP) cores that have detection capability against functional-type hardware Trojans in a global supply chain. In the current design and fabrication supply chain, design houses, circuits and system core vendors, and manufacturing houses are globally scattered. It is quite possible that Trojans can be inserted in this design and manufacturing supply chain by anyone involved at any phase. Such Trojans can give backdoors to hackers and affect the operation of the system that uses the infected hardware. In a worst case, in critical applications, such as aircrafts and medical devices, functioning can be completely stopped, causing catastrophic consequences.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90346875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Obfuscation of JPEG CODEC IP core for CE devices 用于CE设备的JPEG CODEC IP核的混淆
Pub Date : 2019-01-30 DOI: 10.1049/pbcs060e_ch9
A. Sengupta, S. Mohanty
Joint Picture Export Group (JPEG) is the most commonly used image compression standard in the world. One cannot comprehend a CE system that does not process a JPEG. Without JPEG there is no smartphone photography, no social media. So, authors feel strongly that this important multimedia core “JPEG”needs to give well-deserving credit in terms of securing it when security/protection of “DSP core”has been a major focus of all the discussions in this book so far. The chapter is organized as follows: Section 9.2 provides an overview of DCT-based JPEG compression and decompression process. Section 9.3 explains the design process of generating structurally obfuscated JPEG CODEC IP core; Section 9.4 provides a detailed insight on the implementation process of obfuscated JPEG codec IP core in a CAD synthesis tool. Section 9.5 provides implementation and analysis of JPEG CODEC IP core as well as compressed images through the devised JPEG CODEC IP core.
JPEG (Joint Picture Export Group)是目前世界上最常用的图像压缩标准。人们无法理解不处理JPEG的CE系统。没有JPEG就没有智能手机摄影,没有社交媒体。因此,作者强烈认为,当“DSP核心”的安全性/保护成为本书迄今为止所有讨论的主要焦点时,这个重要的多媒体核心“JPEG”需要在保护它方面给予应得的信任。本章组织如下:第9.2节概述了基于dct的JPEG压缩和解压缩过程。第9.3节解释了生成结构混淆的JPEG CODEC IP核的设计过程;第9.4节详细介绍了在CAD合成工具中实现模糊JPEG编解码器IP核的过程。第9.5节提供了JPEG CODEC IP核的实现和分析,以及通过设计的JPEG CODEC IP核压缩图像。
{"title":"Obfuscation of JPEG CODEC IP core for CE devices","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/pbcs060e_ch9","DOIUrl":"https://doi.org/10.1049/pbcs060e_ch9","url":null,"abstract":"Joint Picture Export Group (JPEG) is the most commonly used image compression standard in the world. One cannot comprehend a CE system that does not process a JPEG. Without JPEG there is no smartphone photography, no social media. So, authors feel strongly that this important multimedia core “JPEG”needs to give well-deserving credit in terms of securing it when security/protection of “DSP core”has been a major focus of all the discussions in this book so far. The chapter is organized as follows: Section 9.2 provides an overview of DCT-based JPEG compression and decompression process. Section 9.3 explains the design process of generating structurally obfuscated JPEG CODEC IP core; Section 9.4 provides a detailed insight on the implementation process of obfuscated JPEG codec IP core in a CAD synthesis tool. Section 9.5 provides implementation and analysis of JPEG CODEC IP core as well as compressed images through the devised JPEG CODEC IP core.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78328321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IP Core Protection and Hardware-Assisted Security for Consumer Electronics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1