Information dispersion for trojan defense through high-level synthesis

S. T.Choden Konigsmark, Deming Chen, Martin D.F. Wong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Emerging technologies such as the Internet of Things (IoT) heavily rely on hardware security for data and privacy protection. However, constantly increasing integration complexity requires automatic synthesis to maintain the pace of innovation. We introduce the first High-Level Synthesis (HLS) flow that produces a security enhanced hardware design to directly prevent Hardware Trojan Horse (HTH) injection by a malicious foundry. Through analysis of entropy loss and criticality decay, the presented algorithms implement highly efficient resource-targeted information dispersion to counter HTH insertion. The flow is evaluated on existing HLS benchmarks and a new IoT-specific benchmark and shows significant resource savings.

Original languageEnglish (US)
Title of host publicationProceedings of the 53rd Annual Design Automation Conference, DAC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781450342360
DOIs
StatePublished - Jun 5 2016
Event53rd Annual ACM IEEE Design Automation Conference, DAC 2016 - Austin, United States
Duration: Jun 5 2016Jun 9 2016

Publication series

NameProceedings - Design Automation Conference
Volume05-09-June-2016
ISSN (Print)0738-100X

Other

Other53rd Annual ACM IEEE Design Automation Conference, DAC 2016
CountryUnited States
CityAustin
Period6/5/166/9/16

Fingerprint

High-level Synthesis
Internet of Things
Hardware
Entropy Loss
Benchmark
Privacy Protection
Resources
Hardware Design
Foundries
Criticality
Computer hardware
Insertion
Injection
Entropy
Innovation
Decay
Synthesis
High level synthesis
Hardware security
Malware

Keywords

  • Hardware trojans
  • High-level synthesis
  • Security

ASJC Scopus subject areas

  • Computer Science Applications
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Modeling and Simulation

Cite this

Konigsmark, S. T. C., Chen, D., & Wong, M. D. F. (2016). Information dispersion for trojan defense through high-level synthesis. In Proceedings of the 53rd Annual Design Automation Conference, DAC 2016 [a87] (Proceedings - Design Automation Conference; Vol. 05-09-June-2016). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1145/2897937.2898034

Information dispersion for trojan defense through high-level synthesis. / Konigsmark, S. T.Choden; Chen, Deming; Wong, Martin D.F.

Proceedings of the 53rd Annual Design Automation Conference, DAC 2016. Institute of Electrical and Electronics Engineers Inc., 2016. a87 (Proceedings - Design Automation Conference; Vol. 05-09-June-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Konigsmark, STC, Chen, D & Wong, MDF 2016, Information dispersion for trojan defense through high-level synthesis. in Proceedings of the 53rd Annual Design Automation Conference, DAC 2016., a87, Proceedings - Design Automation Conference, vol. 05-09-June-2016, Institute of Electrical and Electronics Engineers Inc., 53rd Annual ACM IEEE Design Automation Conference, DAC 2016, Austin, United States, 6/5/16. https://doi.org/10.1145/2897937.2898034
Konigsmark STC, Chen D, Wong MDF. Information dispersion for trojan defense through high-level synthesis. In Proceedings of the 53rd Annual Design Automation Conference, DAC 2016. Institute of Electrical and Electronics Engineers Inc. 2016. a87. (Proceedings - Design Automation Conference). https://doi.org/10.1145/2897937.2898034
Konigsmark, S. T.Choden ; Chen, Deming ; Wong, Martin D.F. / Information dispersion for trojan defense through high-level synthesis. Proceedings of the 53rd Annual Design Automation Conference, DAC 2016. Institute of Electrical and Electronics Engineers Inc., 2016. (Proceedings - Design Automation Conference).
@inproceedings{59c77deb64b544259169d8aab815b25a,
title = "Information dispersion for trojan defense through high-level synthesis",
abstract = "Emerging technologies such as the Internet of Things (IoT) heavily rely on hardware security for data and privacy protection. However, constantly increasing integration complexity requires automatic synthesis to maintain the pace of innovation. We introduce the first High-Level Synthesis (HLS) flow that produces a security enhanced hardware design to directly prevent Hardware Trojan Horse (HTH) injection by a malicious foundry. Through analysis of entropy loss and criticality decay, the presented algorithms implement highly efficient resource-targeted information dispersion to counter HTH insertion. The flow is evaluated on existing HLS benchmarks and a new IoT-specific benchmark and shows significant resource savings.",
keywords = "Hardware trojans, High-level synthesis, Security",
author = "Konigsmark, {S. T.Choden} and Deming Chen and Wong, {Martin D.F.}",
year = "2016",
month = "6",
day = "5",
doi = "10.1145/2897937.2898034",
language = "English (US)",
series = "Proceedings - Design Automation Conference",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "Proceedings of the 53rd Annual Design Automation Conference, DAC 2016",
address = "United States",

}

TY - GEN

T1 - Information dispersion for trojan defense through high-level synthesis

AU - Konigsmark, S. T.Choden

AU - Chen, Deming

AU - Wong, Martin D.F.

PY - 2016/6/5

Y1 - 2016/6/5

N2 - Emerging technologies such as the Internet of Things (IoT) heavily rely on hardware security for data and privacy protection. However, constantly increasing integration complexity requires automatic synthesis to maintain the pace of innovation. We introduce the first High-Level Synthesis (HLS) flow that produces a security enhanced hardware design to directly prevent Hardware Trojan Horse (HTH) injection by a malicious foundry. Through analysis of entropy loss and criticality decay, the presented algorithms implement highly efficient resource-targeted information dispersion to counter HTH insertion. The flow is evaluated on existing HLS benchmarks and a new IoT-specific benchmark and shows significant resource savings.

AB - Emerging technologies such as the Internet of Things (IoT) heavily rely on hardware security for data and privacy protection. However, constantly increasing integration complexity requires automatic synthesis to maintain the pace of innovation. We introduce the first High-Level Synthesis (HLS) flow that produces a security enhanced hardware design to directly prevent Hardware Trojan Horse (HTH) injection by a malicious foundry. Through analysis of entropy loss and criticality decay, the presented algorithms implement highly efficient resource-targeted information dispersion to counter HTH insertion. The flow is evaluated on existing HLS benchmarks and a new IoT-specific benchmark and shows significant resource savings.

KW - Hardware trojans

KW - High-level synthesis

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=84977098219&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84977098219&partnerID=8YFLogxK

U2 - 10.1145/2897937.2898034

DO - 10.1145/2897937.2898034

M3 - Conference contribution

AN - SCOPUS:84977098219

T3 - Proceedings - Design Automation Conference

BT - Proceedings of the 53rd Annual Design Automation Conference, DAC 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -