Security-Aware Task Scheduling Using Untrusted Components in High-Level Synthesis
The high penetration of third-party intellectual property is accompanied with severe security issues, and thus, security constraints during task scheduling have recently been proposed for protecting multiprocessor system-on-chip systems. However, these security constraints incur significant overhead...
Main Authors: | Nan Wang, Song Chen, Jianmo Ni, Xiaofeng Ling, Yu Zhu |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8249527/ |
Similar Items
-
Hybrid multi‐level hardware Trojan detection platform for gate‐level netlists based on XGBoost
by: Ying Zhang, et al.
Published: (2022-03-01) -
PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans
by: Junjun Huan, et al.
Published: (2024-01-01) -
Design and detection of hardware Trojan based on satisfiability don't cares
by: Lingjuan WU, et al.
Published: (2021-04-01) -
Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques
by: Thejaswini P, et al.
Published: (2022-12-01) -
Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
by: He, Wei, et al.
Published: (2017)