Hologram-based structural obfuscation for DSP cores

Hologram-based structural obfuscation for DSP cores

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This chapter highlights an alternative paradigm for the design of structurally obfuscated digital signal processing (DSP) cores inspired by security hologram. Discussion on different structural-obfuscation techniques have been included in this chapter with emphasis on the algorithms used for obfuscation during design synthesis of high-level synthesis (HLS). The chapter is organized as follows: Section 8.1 introduces the importance of obfuscation for IP cores during the system-on-chip design process; Section 8.2 discusses the background on security hologram; Section 8.3 highlights the possible use of applying the hologram concept for structural obfuscation; Section 8.4 explains the hologram-based obfuscation methodology for DSP cores; Section 8.5 presents illustrative examples for hologram-based obfuscation on DSP cores; Section 8.6 discusses the process of determination of gate count for un-obfuscated and obfuscated designs; Section 8.7 presents a demonstration and examples of high-level transformation-based obfuscated DSP circuits; Section 8.8 presents design examples of un-obfuscated (baseline) DSP circuits; Section 8.9 presents analysis on case studies; Section 8.10 concludes the chapter.

Chapter Contents:

  • 8.1 Introduction
  • 8.2 Background on hologram
  • 8.3 Applying hologram concept for structural obfuscation
  • 8.4 Hologram-based obfuscation methodology
  • 8.4.1 Features of hologram-based obfuscation (Sengupta and Rathor, 2019)
  • 8.4.2 Threat model
  • 8.4.3 Overview
  • 8.4.4 Details of hologram-based obfuscation
  • 8.5 Illustrative examples of hologram-based obfuscation for DSP cores
  • 8.5.1 Case study of IIR-FIR filter obfuscated design
  • 8.5.2 Case study of 4-point DCT-IDCT obfuscated design
  • 8.6 Determination of gate count affected due to hologram-based obfuscation of DSP cores
  • 8.7 Structural obfuscation of DSP cores (circuits) using high-level transformation (Sengupta et al., 2017a)
  • 8.7.1 Example 1: 4-point DCT
  • 8.7.2 Example 2: 8-point DCT
  • 8.7.3 Example 3: 8-point IDCT
  • 8.7.4 Example 4: FIR filter
  • 8.7.5 Example 5: IIR filter
  • 8.7.6 Example 6: 4-point IDCT
  • 8.8 Design of non-obfuscated (baseline versions) DSP circuits
  • 8.8.1 Example 1: 4-point DCT (Sengupta and Mohanty, 2019)
  • 8.8.2 Example 2: 4-point IDCT
  • 8.8.3 Example 3: 4-point DIT-FFT
  • 8.8.4 Example 4: 8-point DIT-FFT
  • 8.8.5 Example 5: 8-point DCT
  • 8.8.6 Example 6: 8-point IDCT
  • 8.8.7 Example 7: FIR filter
  • 8.8.8 Example 8: IIR filter
  • 8.9 Analyses of case studies
  • 8.9.1 Strength of obfuscation analysis
  • 8.9.2 Design area analysis
  • 8.9.3 Design delay analysis
  • 8.10 Conclusion
  • 8.11 Questions and exercises
  • References

Inspec keywords: high level synthesis; holography; digital signal processing chips; security of data

Other keywords: high-level synthesis; un-obfuscated DSP circuits; DSP cores; hologram-based obfuscation methodology; security hologram; system-on-chip design process; structurally obfuscated digital signal processing; hologram-based structural obfuscation; IP cores; structural-obfuscation techniques; high-level transformation-based obfuscated DSP circuits

Subjects: Electronic engineering computing; Semiconductor integrated circuits; Digital signal processing; Holography; Data security

Preview this chapter:
Zoom in

Hologram-based structural obfuscation for DSP cores, Page 1 of 2

| /docserver/preview/fulltext/books/cs/pbcs067e/PBCS067E_ch8-1.gif /docserver/preview/fulltext/books/cs/pbcs067e/PBCS067E_ch8-2.gif

Related content

This is a required field
Please enter a valid email address