Revisiting Black-Hat HLS: A Lightweight Countermeasure to HLS-Aided Trojan Attack
| dc.contributor.author | Rathor M.; Sengupta A. | |
| dc.date.accessioned | 2025-05-23T11:13:21Z | |
| dc.description.abstract | One of the dark side of horizontal semiconductor business model could be the supply of compromised computer-aided design (CAD) tools by an adversary to the designers. A compromised or black-hat high-level synthesis (HLS) tool may secretly insert Trojan into the design being synthesized to affect its functional or nonfunctional aspects. Recently, a black-hat HLS was presented which inserts fake operations during the scheduling process to enable battery exhaustion attack. In this letter, we present a framework to detect the fake operations inserted by a compromised HLS with the help of scheduling information provided by the tool. We implemented our detection framework on a number of benchmarks and analyzed the detection time and accuracy. We also analyzed the cost of fake operation insertion in terms of design area and delay overhead. © 2009-2012 IEEE. | |
| dc.identifier.doi | https://doi.org/10.1109/LES.2023.3327793 | |
| dc.identifier.uri | http://172.23.0.11:4000/handle/123456789/5718 | |
| dc.relation.ispartofseries | IEEE Embedded Systems Letters | |
| dc.title | Revisiting Black-Hat HLS: A Lightweight Countermeasure to HLS-Aided Trojan Attack |