Privacy Protection of VLSI Circuits through High Level Transformation Based Obfuscation

نویسندگان

  • S. Bhuvaneswari
  • A. Hemamalini
  • A. Anbarasan
چکیده

For any semiconductor manufacturing requires greater capital investments, the use of contract foundries has grown dramatically, increasing exposure to theft and unauthorized excess production. Many recent activities proved that IC piracy has now become a major challenge for the electronics and defense industries. In this paper we presents a novel approach to design obfuscated circuits for digital signal processing (DSP) applications using high-level transformations, a key-based obfuscating finite-state machine (FSM), and a reconfiguration. The goal is to design DSP circuits that are harder to reverse engineer. With several modes of operations for obfuscation where the outputs are meaningful from a signal processing point of view, but are functionally incorrect for better confusion. The configure data controls various modes of the circuit operation and Functional obfuscation is accomplished with the use of the correct initialization key. Structural obfuscation is also achieved by the proposed methodology via high-level transformations. The efficiency of proposed methodology is verified with FIR design, strong high level obfuscation is proved and analyzed for various key sizes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient CAD tool for High-Level Synthesis of VLSI digital transformers

Digital transformers are considered as one of the digital circuits being widely used in signal and data processing systems, audio and video processing, medical signal processing as well as telecommunication systems. Transforms such as Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Fast Fourier Transform (FFT) are among the ones being commonly used in this area. As an illu...

متن کامل

Optimizing the Location Obfuscation in Location-Based Mobile Systems

A major concern regarding location-based applications in mobile systems is the user’s location privacy, i.e. the exposure of user’s location information to unauthorized third parties. Location obfuscation is a common privacy protection mechanism that provides imprecise location information in order to create uncertainty for an adversary. However, in a mobile setup the way of determining the rep...

متن کامل

Integrating Utility into Face De-identification

With the proliferation of inexpensive video surveillance and face recognition technologies, it is increasingly possible to track and match people as they move through public spaces. To protect the privacy of subjects visible in video sequences, prior research suggests using ad hoc obfuscation methods, such as blurring or pixelation of the face. However, there has been little investigation into ...

متن کامل

Location Privacy Protection Through Obfuscation-Based Techniques

The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications that manage physical positions of individuals to offer location-based services for business, social or informational purposes. As an effect of such innovative services, however, privacy concerns are increasing, calling ...

متن کامل

Bob-Tree: An Efficient B + -Tree Based Index Structure for Geographic-Aware Obfuscation

The privacy protection of personal location information increasingly gains special attention in the field of location-based services, and obfuscation is the most popular technique aiming at protecting this sensitive information. However, all of the conventional obfuscation techniques are geometry-based and separated from the database level. Thus, the query processing has two timeconsuming phase...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016