Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression

نویسندگان

چکیده

This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications. The proposed work offers security against altering register transfer level (RTL) description using multilevel as well IP piracy secret impression. In this approach, an invisible is covertly implanted into the structurally obfuscated DSP design robust encoding encryption multi-iteration Feistel cipher. Our more than recent facial biometric steganography-based hardware techniques, in terms stronger proof evidence tamper tolerance ability. results report following qualitative quantitative analysis based framework: (a) very low probability coincidence (Pc) (indicating strength evidence) for different range 7.59E-5 1.2E-1; (b) 5.62E+14 3.40E+38; (c) negligible cost overhead 0.00 % cores; (d) number gates obfuscated.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Android Code Using White Box Cryptography and Obfuscation Techniques

Code obfuscation is a set of program transformations that make program code and program execution difficult to analyze. First of all, obfuscation hinders manual inspection of program internals. By renaming variables and functions, and breaking down structures, it protects against reverse-engineering. It protects both storage and usage of keys, and it can hide certain properties such as a softwa...

متن کامل

Generation of Custom DSP Transform IP Cores: Case Study Walsh-Hadamard Transform -

Hardware designers are increasingly relying on pre-designed DSP (digital signal processing) cores from IP libraries to improve their productivity and reduce design time. Unfortunately, static DSP cores cannot accommodate application-specific trade-offs. To overcome this problem, we are proposing to automatically generate customized DSP cores that can be tailored for specific design requirements...

متن کامل

Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation

The fabrication of digital Integrated Circuits (ICs) is increasingly outsourced. Given this trend, security is recognized as an important issue. The threat agent is an attacker at the IC foundry that has information about the circuit and inserts covert, malicious circuitry. The use of 3D IC technology has been suggested as a possible technique to counter this threat. However, to our knowledge, ...

متن کامل

Securing mobile IP enabled laptop

Mobile IP Onternet Protocol) enables access to the Internet anywhere with one IP address, hence, providing the flexibility that is required by today’s growing mobile work force. Deploying Mobile IP introduces new security h a t s that if not carefully addressed can have severe consequences for home organizations. IPSec is a commonly used protection mechanism that is employed in this context. IP...

متن کامل

Towards Evolvable IP Cores for FPGAs

The paper deals with a new approach to the design of adaptive hardware using common Field Programmable Gate Arrays (FPGA). The ultimate aim is to develop evolvable IP (Intellectual Property) cores. The cores should be reused in the same way as ordinary IP cores are reused. In contrast to the conventional cores, the evolvable cores are able to perform autonomous evolution of their internal circu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2022

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2022.3174349