Secured and Optimized Hardware Accelerators using Key-Controlled Encoded Hash Slices and Firefly Algorithm based Exploration
Document Type
Conference Article
Publication Title
Proceedings of the International Conference on Microelectronics, ICM
Abstract
The design process of application-specific integrated circuits (ASICs) as hardware accelerators or reusable hardware intellectual property (IP) cores require considering various design goals like area, latency, and security against attacks such as IP piracy and false claims of IP ownership during architectural synthesis. The problem of IP piracy and false IP ownership claim poses a significant threat to hardware IP cores, jeopardizing innovation, fair competition, and economic growth. The proposed work introduces a novel security framework to design secured and optimized hardware accelerators using key-controlled encoded hash slices integrated with firefly algorithm (FF) based design space exploration (DSE) during high level synthesis (HLS). The proposed methodology also demonstrates the embedding of covert security constraints into an optimal 8-point DCT hardware IP design, obtained by performing a tradeoff between area and latency through the FF-based DSE. The proposed methodology achieves stronger tamper tolerance and entropy than recent approaches. The experimental results also provide design cost assessment and optimality analysis.
First Page
149
Last Page
152
DOI
10.1109/ICM60448.2023.10378911
Publication Date
1-1-2023
Recommended Citation
Sengupta, Anirban; Anshul, Aditya; Kothari, Chirag; and Thakur, Sumer, "Secured and Optimized Hardware Accelerators using Key-Controlled Encoded Hash Slices and Firefly Algorithm based Exploration" (2023). Conference Articles. 531.
https://digitalcommons.isical.ac.in/conf-articles/531