DSP design protection in CE through algorithmic transformation based structural obfuscation

Structural obfuscation offers a means to effectively secure through obfuscation the contents of an intellectual property (IP) cores used in an electronic system-on-chip (SoC). In this work a novel structural obfuscation methodology for protecting a digital signal processor (DSP) IP core at the archi...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on consumer electronics Vol. 63; no. 4; pp. 467 - 476
Main Authors: Sengupta, Anirban, Roy, Dipanjan, Mohanty, Saraju P., Corcoran, Peter
Format: Journal Article
Language:English
Published: New York IEEE 01.11.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:0098-3063, 1558-4127
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Structural obfuscation offers a means to effectively secure through obfuscation the contents of an intellectual property (IP) cores used in an electronic system-on-chip (SoC). In this work a novel structural obfuscation methodology for protecting a digital signal processor (DSP) IP core at the architectural synthesis design stage. The proposed approach specifically targets protection of IP cores that involve complex loops. Five different algorithmic level transformation techniques are employed: loop unrolling, loop invariant code motion, tree height reduction/increment, logic transformation and redundant operation removal. Each of these can yield camouflaged functionally equivalent designs. In addition, low cost obfuscated design is generated through proposed approach through the use of multi-stage algorithmic transformation and particle swarm optimization (PSO)-drive design space exploration (DSE). Results of proposed approach yielded an enhancement obfuscation of 22 % and reduction in obfuscated design cost of 55 % compared to similar prior art.
AbstractList Structural obfuscation offers a means to effectively secure through obfuscation the contents of an intellectual property (IP) cores used in an electronic system-on-chip (SoC). In this work a novel structural obfuscation methodology for protecting a digital signal processor (DSP) IP core at the architectural synthesis design stage. The proposed approach specifically targets protection of IP cores that involve complex loops. Five different algorithmic level transformation techniques are employed: loop unrolling, loop invariant code motion, tree height reduction/increment, logic transformation and redundant operation removal. Each of these can yield camouflaged functionally equivalent designs. In addition, low cost obfuscated design is generated through proposed approach through the use of multi-stage algorithmic transformation and particle swarm optimization (PSO)-drive design space exploration (DSE). Results of proposed approach yielded an enhancement obfuscation of 22 % and reduction in obfuscated design cost of 55 % compared to similar prior art.
Author Sengupta, Anirban
Roy, Dipanjan
Mohanty, Saraju P.
Corcoran, Peter
Author_xml – sequence: 1
  givenname: Anirban
  surname: Sengupta
  fullname: Sengupta, Anirban
  email: asengupt@iiti.ac.in
  organization: Discipline of Comput. Sci. & Eng., Indian Inst. of Technol., Indore, Indore, India
– sequence: 2
  givenname: Dipanjan
  surname: Roy
  fullname: Roy, Dipanjan
  email: phd1501201007@iiti.ac.in
  organization: Discipline of Comput. Sci. & Eng., Indian Inst. of Technol., Indore, Indore, India
– sequence: 3
  givenname: Saraju P.
  surname: Mohanty
  fullname: Mohanty, Saraju P.
  email: Saraju.Mohanty@unt.edu
  organization: Dept. of Comput. Sci., Univ. of North Texas, Denton, TX, USA
– sequence: 4
  givenname: Peter
  surname: Corcoran
  fullname: Corcoran, Peter
  email: peter.corcoran@nuigalway.ie
  organization: Coll. of Eng. & Inf., Nat. Univ. of Ireland Galway, Galway, Ireland
BookMark eNp9kL1PwzAQxS1UJNrCzMBiiTmt7diJM6JQPqRKIFEmhsh27dZVGhfbGfjvcRvEwIBuuOHeu6f3m4BR5zoNwDVGM4xRNV_VixlBuJwhzFBJzsAYM8Yzikk5AmOEKp7lqMgvwCSEHUKYMsLH4OP-7RWudbCbDh68i1pF6zpoO1gvYNx612-2ULQb523c7q2C0YsuGOf34iSUIug1DNH3KvZetNBJ0wd1Ol6CcyPaoK9-9hS8PyxW9VO2fHl8ru-WmSK8ilmFsDRCKKa4xporSopSaslkzoyhDJuKGJ3GSERpRVkhUl0pOSEMyUKifApuh7-pwGevQ2x2rvddimxwxQtKMc-rpJoPKuVdCF6b5uDtXvivBqPmSLBJBJsjwWYgmBzsj0PZeGqWINj2H9_N4LNa698UTmjBCcu_AVbhgOY
CODEN ITCEDA
CitedBy_id crossref_primary_10_1109_TCE_2020_3027760
crossref_primary_10_1109_TCE_2018_2890616
crossref_primary_10_1016_j_vlsi_2023_102114
crossref_primary_10_1109_TCE_2018_2852265
crossref_primary_10_1038_s41598_025_96495_5
crossref_primary_10_1109_ACCESS_2018_2873751
crossref_primary_10_1109_TCE_2018_2852264
crossref_primary_10_1109_ACCESS_2019_2936401
crossref_primary_10_1145_3410337
crossref_primary_10_1109_TCAD_2020_3047976
crossref_primary_10_1109_LES_2023_3327793
crossref_primary_10_1109_TCE_2019_2924049
crossref_primary_10_1109_MDAT_2024_3395981
crossref_primary_10_1109_TCE_2018_2885998
crossref_primary_10_1109_TCE_2021_3105113
crossref_primary_10_1109_MCAS_2023_3325607
crossref_primary_10_3390_computers14070251
crossref_primary_10_1109_TCE_2020_2972808
crossref_primary_10_1109_TVLSI_2023_3253641
crossref_primary_10_3390_electronics12010243
crossref_primary_10_1109_TCE_2019_2944882
crossref_primary_10_1109_TVLSI_2022_3179304
crossref_primary_10_3390_electronics10141656
crossref_primary_10_1109_ACCESS_2019_2963711
crossref_primary_10_1145_3342099
Cites_doi 10.1109/TIFS.2016.2601067
10.1109/TCAD.2004.828122
10.1049/el.2017.1329
10.1145/2902961.2903000
10.1145/1403375.1403631
10.1109/MCE.2015.2484745
10.1109/TCAD.2016.2597232
10.1109/TVLSI.2014.2323976
10.1109/TCE.2015.7298086
10.1109/ISCAS.2008.4542135
10.1109/ICCE.2009.5012160
10.1109/TCE.2011.5955169
10.1145/2508859.2516656
10.1109/CISIM.2007.51
10.1109/MDT.2010.24
10.1109/TCAD.2009.2028166
10.1109/MCE.2016.2614552
10.1109/ACSSC.2012.6488967
10.1109/TVLSI.2007.896914
10.1109/ICCE-Berlin.2016.7684718
10.1109/ICCCC.2016.7496733
10.1109/TCE.2013.6531127
10.1109/TCE.2009.5373756
10.1109/TVLSI.2015.2437996
10.1109/MCE.2016.2522018
10.1145/2228360.2228377
10.1016/j.future.2017.01.021
10.1109/ACCESS.2016.2552058
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
8FD
F28
FR3
L7M
DOI 10.1109/TCE.2017.015072
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Electronics & Communications Abstracts
Technology Research Database
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Engineering Research Database
Technology Research Database
Advanced Technologies Database with Aerospace
ANTE: Abstracts in New Technology & Engineering
Electronics & Communications Abstracts
DatabaseTitleList Engineering Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-4127
EndPage 476
ExternalDocumentID 10_1109_TCE_2017_015072
8246825
Genre orig-research
GroupedDBID -~X
.DC
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
ACGFO
ACIWK
ACKIV
ACNCT
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IBMZZ
ICLAB
IFIPE
IFJZH
IPLJI
JAVBF
LAI
MS~
O9-
OCL
P2P
RIA
RIE
RNS
TAE
TN5
VH1
AAYXX
CITATION
7SP
8FD
F28
FR3
L7M
RIG
ID FETCH-LOGICAL-c289t-901bfaac5c8e1e8c4267beb5b35ff451f92fefeffb0449456a109bb82250b6b03
IEDL.DBID RIE
ISICitedReferencesCount 45
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000423276800016&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0098-3063
IngestDate Mon Jun 30 16:10:58 EDT 2025
Sat Nov 29 06:45:09 EST 2025
Tue Nov 18 21:42:11 EST 2025
Wed Aug 27 02:48:10 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c289t-901bfaac5c8e1e8c4267beb5b35ff451f92fefeffb0449456a109bb82250b6b03
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 1986441839
PQPubID 85469
PageCount 10
ParticipantIDs crossref_citationtrail_10_1109_TCE_2017_015072
crossref_primary_10_1109_TCE_2017_015072
ieee_primary_8246825
proquest_journals_1986441839
PublicationCentury 2000
PublicationDate 2017-11-01
PublicationDateYYYYMMDD 2017-11-01
PublicationDate_xml – month: 11
  year: 2017
  text: 2017-11-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on consumer electronics
PublicationTitleAbbrev T-CE
PublicationYear 2017
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref34
ref12
ref15
ref31
ref30
ref11
ref32
ref10
wang (ref25) 2016
(ref37) 0
ref2
ref1
ref17
ref16
li (ref6) 2015
(ref35) 0
ref19
ref18
mohanty (ref14) 2015
ref24
ref26
ref20
ref22
ref21
(ref36) 0
koushanfar (ref33) 2012
alkabani (ref23) 2007
ref28
ref27
ref29
ref7
kruni (ref5) 2016
ref9
ref4
ref3
(ref8) 2017
References_xml – ident: ref18
  doi: 10.1109/TIFS.2016.2601067
– ident: ref32
  doi: 10.1109/TCAD.2004.828122
– ident: ref29
  doi: 10.1049/el.2017.1329
– start-page: 133
  year: 2016
  ident: ref25
  article-title: Secure and low-overhead circuit obfuscation technique with multiplexers
  publication-title: GLSVLSI
  doi: 10.1145/2902961.2903000
– year: 2015
  ident: ref14
  publication-title: Nanoelectronic Mixed-Signal System Design
– ident: ref26
  doi: 10.1145/1403375.1403631
– ident: ref7
  doi: 10.1109/MCE.2015.2484745
– ident: ref34
  doi: 10.1109/TCAD.2016.2597232
– ident: ref11
  doi: 10.1109/TVLSI.2014.2323976
– ident: ref15
  doi: 10.1109/TCE.2015.7298086
– ident: ref9
  doi: 10.1109/ISCAS.2008.4542135
– ident: ref4
  doi: 10.1109/ICCE.2009.5012160
– ident: ref3
  doi: 10.1109/TCE.2011.5955169
– year: 2017
  ident: ref8
  publication-title: The Economic Impacts of Counterfeiting and Piracy last modified
– ident: ref21
  doi: 10.1145/2508859.2516656
– year: 0
  ident: ref37
  publication-title: BDTI DSP Kernel Benchmarks
– start-page: 20:1
  year: 2007
  ident: ref23
  article-title: Active Hardware Metering for Intellectual Property Protection and Security
  publication-title: USENIX Association
– year: 0
  ident: ref35
  publication-title: NanGate 15 nm open cell library
– ident: ref19
  doi: 10.1109/CISIM.2007.51
– ident: ref28
  doi: 10.1109/MDT.2010.24
– start-page: 575
  year: 2016
  ident: ref5
  article-title: Data flow CAD tool for firniware development and power consumption estimation in multicore hearing aids
  publication-title: Proc IEEE ICCE
– ident: ref22
  doi: 10.1109/TCAD.2009.2028166
– ident: ref13
  doi: 10.1109/MCE.2016.2614552
– ident: ref10
  doi: 10.1109/ACSSC.2012.6488967
– ident: ref1
  doi: 10.1109/TVLSI.2007.896914
– ident: ref12
  doi: 10.1109/ICCE-Berlin.2016.7684718
– ident: ref20
  doi: 10.1109/ICCCC.2016.7496733
– ident: ref2
  doi: 10.1109/TCE.2013.6531127
– ident: ref17
  doi: 10.1109/TCE.2009.5373756
– start-page: 103
  year: 2012
  ident: ref33
  publication-title: Hardware Metering A Survey
– year: 0
  ident: ref36
  publication-title: DSP Benchmark Suite
– ident: ref24
  doi: 10.1109/TVLSI.2015.2437996
– start-page: 92
  year: 2015
  ident: ref6
  article-title: High efficiency VLSI implementation of an edge-directed video up-scaler using high level synthesis
  publication-title: Proc IEEE ICCE
– ident: ref16
  doi: 10.1109/MCE.2016.2522018
– ident: ref27
  doi: 10.1145/2228360.2228377
– ident: ref30
  doi: 10.1016/j.future.2017.01.021
– ident: ref31
  doi: 10.1109/ACCESS.2016.2552058
SSID ssj0014528
Score 2.3946252
Snippet Structural obfuscation offers a means to effectively secure through obfuscation the contents of an intellectual property (IP) cores used in an electronic...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 467
SubjectTerms Algorithm design and analysis
Algorithms
Delays
Design optimization
Digital signal processing
Digital signal processing (DSP) core
Digital signal processors
Hardware
high-level transformation
Intellectual property
IP networks
IP protection
Microprocessors
Particle swarm optimization
Reverse engineering
Signal processing algorithms
Space exploration
structural obfuscation
System on chip
Transformations
Title DSP design protection in CE through algorithmic transformation based structural obfuscation
URI https://ieeexplore.ieee.org/document/8246825
https://www.proquest.com/docview/1986441839
Volume 63
WOSCitedRecordID wos000423276800016&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1558-4127
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014528
  issn: 0098-3063
  databaseCode: RIE
  dateStart: 19750101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFH5sw4Me_DXF6ZQcPHiwW5umTXqUueFpDJww8FCaNNGCtrJ1_v0maVcm6kF6aeGllPfSvO8l730P4FpQprCKpEOxUA6JBNPrIOMOIRgLN9TPCbPNJuh0yhaLaNaC26YWRkppk8_kwNzas_y0EGuzVTZkmIQ6omlDm9KwqtVqTgxIgNmGH1PDYL-m8fHcaDgfjU0OFx2Y6J7ibx7ItlT5sQ5b5zI5-N9nHcJ-DSLRXWX1I2jJ_Bj2tqgFu_B8_zhDqU3PQDUXg7YAynI0GqO6OQ9K3l6KZVa-vmcClVsIVgsa75aiil3WMHOggqv1qtrfO4GnyXg-enDqRgqO0PFUaVIwuEoSEQgmPcmE9sqUSx5wP1CKBJ6KsJL6UtwlJNKQKtFq41xjh8DlIXf9U-jkRS7PAFFs9k2pcJWSxKdJlKacS08kqQ7keJj2YLBRbixqlnHT7OItttGGG8XaGrGxRlxZowc3zYCPimDjb9GuUX4jVuu9B_2N9eL6B1zFnqGdJwb-nf8-6gJ2zaurssI-dLQ-5SXsiM8yWy2v7Nz6AiRIzmM
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwED_mFNQHv6Y4P_Pggw92a7N0SR5lbkycY-CEgQ-lSRMdzFa2zr_fpO3GRH2QvrRwoeUuzf0uufsdwJWkTGPNlUOx1A7hkpl1kAmHEIyl2zTPIcuaTdB-n41GfFCCm2UtjFIqSz5TNXubneVHiZzbrbI6w6RpIpo1WPeNH3Xzaq3lmQHxMVswZBog3CiIfDyX14etts3iojUb31P8zQdlTVV-rMSZe-ns_u_D9mCngJHoNrf7PpRUfADbK-SCFXi5exqgKEvQQAUbg7EBGseo1UZFex4UTl6T6Th9ex9LlK5gWCNo_VuEcn5Zy82BEqHns3yH7xCeO-1hq-sUrRQcaSKq1CZhCB2G0pdMeYpJ45epUMIXDV9r4nuaY63MpYVLCDegKjRqE8KgB98VTeE2jqAcJ7E6BkSx3Tml0tVakQYNeRQJoTwZRiaUE82oCrWFcgNZ8IzbdheTIIs3XB4YawTWGkFujSpcLwd85BQbf4tWrPKXYoXeq3C2sF5Q_IKzwLPE88QCwJPfR13CZnf42At69_2HU9iyr8mLDM-gbHSrzmFDfqbj2fQim2dfFbjRsA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=DSP+design+protection+in+CE+through+algorithmic+transformation+based+structural+obfuscation&rft.jtitle=IEEE+transactions+on+consumer+electronics&rft.au=Sengupta%2C+Anirban&rft.au=Roy%2C+Dipanjan&rft.au=Mohanty%2C+Saraju+P.&rft.au=Corcoran%2C+Peter&rft.date=2017-11-01&rft.issn=0098-3063&rft.volume=63&rft.issue=4&rft.spage=467&rft.epage=476&rft_id=info:doi/10.1109%2FTCE.2017.015072&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TCE_2017_015072
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0098-3063&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0098-3063&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0098-3063&client=summon