Repository logo
Institutional Digital Repository
Shreenivas Deshpande Library, IIT (BHU), Varanasi

Revisiting Black-Hat HLS: A Lightweight Countermeasure to HLS-Aided Trojan Attack

dc.contributor.authorRathor M.; Sengupta A.
dc.date.accessioned2025-05-23T11:13:21Z
dc.description.abstractOne of the dark side of horizontal semiconductor business model could be the supply of compromised computer-aided design (CAD) tools by an adversary to the designers. A compromised or black-hat high-level synthesis (HLS) tool may secretly insert Trojan into the design being synthesized to affect its functional or nonfunctional aspects. Recently, a black-hat HLS was presented which inserts fake operations during the scheduling process to enable battery exhaustion attack. In this letter, we present a framework to detect the fake operations inserted by a compromised HLS with the help of scheduling information provided by the tool. We implemented our detection framework on a number of benchmarks and analyzed the detection time and accuracy. We also analyzed the cost of fake operation insertion in terms of design area and delay overhead. © 2009-2012 IEEE.
dc.identifier.doihttps://doi.org/10.1109/LES.2023.3327793
dc.identifier.urihttp://172.23.0.11:4000/handle/123456789/5718
dc.relation.ispartofseriesIEEE Embedded Systems Letters
dc.titleRevisiting Black-Hat HLS: A Lightweight Countermeasure to HLS-Aided Trojan Attack

Files

Collections