Emerging Topics in Hardware Security 2020
DOI: 10.1007/978-3-030-64448-2_6
|View full text |Cite
|
Sign up to set email alerts
|

Security Assessment of High-Level Synthesis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Our results demonstrate faster coverage of rare targets and more effective detection of trojans hidden in rare locations across a variety of benchmark designs compared to earlier methods. The complete GreyConE+ framework has the potential to significantly enhance the automated detection of security vulnerabilities in HLS designs [48]. The efficiency of GreyConE+ in terms of time, number of test cases, and memory requirements is highly desirable for use in cloud environments, where time, energy, and storage are valuable resources.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Our results demonstrate faster coverage of rare targets and more effective detection of trojans hidden in rare locations across a variety of benchmark designs compared to earlier methods. The complete GreyConE+ framework has the potential to significantly enhance the automated detection of security vulnerabilities in HLS designs [48]. The efficiency of GreyConE+ in terms of time, number of test cases, and memory requirements is highly desirable for use in cloud environments, where time, energy, and storage are valuable resources.…”
Section: Discussionmentioning
confidence: 99%
“…Existing research has predominantly focused on testing Hardware HWIPs at RTL or gate-level designs, leaving a significant gap in exploring testing methodologies at higher levels of abstraction, particularly in the context of HLS tailored for FPGA-cloud environments [48]. However, vulnerabilities at these higher abstraction levels tend to be more intricate and stealthy, especially when HLS IPs contain malicious functionalities like hidden trojan logic, which can pose substantial risks to cloud environments by leaking sensitive information and tampering with cloud computation and data.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation