Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression
نویسندگان
چکیده
This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications. The proposed work offers security against altering register transfer level (RTL) description using multilevel as well IP piracy secret impression. In this approach, an invisible is covertly implanted into the structurally obfuscated DSP design robust encoding encryption multi-iteration Feistel cipher. Our more than recent facial biometric steganography-based hardware techniques, in terms stronger proof evidence tamper tolerance ability. results report following qualitative quantitative analysis based framework: (a) very low probability coincidence (Pc) (indicating strength evidence) for different range 7.59E-5 1.2E-1; (b) 5.62E+14 3.40E+38; (c) negligible cost overhead 0.00 % cores; (d) number gates obfuscated.
منابع مشابه
Securing Android Code Using White Box Cryptography and Obfuscation Techniques
Code obfuscation is a set of program transformations that make program code and program execution difficult to analyze. First of all, obfuscation hinders manual inspection of program internals. By renaming variables and functions, and breaking down structures, it protects against reverse-engineering. It protects both storage and usage of keys, and it can hide certain properties such as a softwa...
متن کاملGeneration of Custom DSP Transform IP Cores: Case Study Walsh-Hadamard Transform -
Hardware designers are increasingly relying on pre-designed DSP (digital signal processing) cores from IP libraries to improve their productivity and reduce design time. Unfortunately, static DSP cores cannot accommodate application-specific trade-offs. To overcome this problem, we are proposing to automatically generate customized DSP cores that can be tailored for specific design requirements...
متن کاملSecuring Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation
The fabrication of digital Integrated Circuits (ICs) is increasingly outsourced. Given this trend, security is recognized as an important issue. The threat agent is an attacker at the IC foundry that has information about the circuit and inserts covert, malicious circuitry. The use of 3D IC technology has been suggested as a possible technique to counter this threat. However, to our knowledge, ...
متن کاملSecuring mobile IP enabled laptop
Mobile IP Onternet Protocol) enables access to the Internet anywhere with one IP address, hence, providing the flexibility that is required by today’s growing mobile work force. Deploying Mobile IP introduces new security h a t s that if not carefully addressed can have severe consequences for home organizations. IPSec is a commonly used protection mechanism that is employed in this context. IP...
متن کاملTowards Evolvable IP Cores for FPGAs
The paper deals with a new approach to the design of adaptive hardware using common Field Programmable Gate Arrays (FPGA). The ultimate aim is to develop evolvable IP (Intellectual Property) cores. The cores should be reused in the same way as ordinary IP cores are reused. In contrast to the conventional cores, the evolvable cores are able to perform autonomous evolution of their internal circu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2022
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2022.3174349