DSP design protection in CE through algorithmic transformation based structural obfuscation
Structural obfuscation offers a means to effectively secure through obfuscation the contents of an intellectual property (IP) cores used in an electronic system-on-chip (SoC). In this work a novel structural obfuscation methodology for protecting a digital signal processor (DSP) IP core at the archi...
Saved in:
| Published in: | IEEE transactions on consumer electronics Vol. 63; no. 4; pp. 467 - 476 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
IEEE
01.11.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects: | |
| ISSN: | 0098-3063, 1558-4127 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Structural obfuscation offers a means to effectively secure through obfuscation the contents of an intellectual property (IP) cores used in an electronic system-on-chip (SoC). In this work a novel structural obfuscation methodology for protecting a digital signal processor (DSP) IP core at the architectural synthesis design stage. The proposed approach specifically targets protection of IP cores that involve complex loops. Five different algorithmic level transformation techniques are employed: loop unrolling, loop invariant code motion, tree height reduction/increment, logic transformation and redundant operation removal. Each of these can yield camouflaged functionally equivalent designs. In addition, low cost obfuscated design is generated through proposed approach through the use of multi-stage algorithmic transformation and particle swarm optimization (PSO)-drive design space exploration (DSE). Results of proposed approach yielded an enhancement obfuscation of 22 % and reduction in obfuscated design cost of 55 % compared to similar prior art. |
|---|---|
| AbstractList | Structural obfuscation offers a means to effectively secure through obfuscation the contents of an intellectual property (IP) cores used in an electronic system-on-chip (SoC). In this work a novel structural obfuscation methodology for protecting a digital signal processor (DSP) IP core at the architectural synthesis design stage. The proposed approach specifically targets protection of IP cores that involve complex loops. Five different algorithmic level transformation techniques are employed: loop unrolling, loop invariant code motion, tree height reduction/increment, logic transformation and redundant operation removal. Each of these can yield camouflaged functionally equivalent designs. In addition, low cost obfuscated design is generated through proposed approach through the use of multi-stage algorithmic transformation and particle swarm optimization (PSO)-drive design space exploration (DSE). Results of proposed approach yielded an enhancement obfuscation of 22 % and reduction in obfuscated design cost of 55 % compared to similar prior art. |
| Author | Sengupta, Anirban Roy, Dipanjan Mohanty, Saraju P. Corcoran, Peter |
| Author_xml | – sequence: 1 givenname: Anirban surname: Sengupta fullname: Sengupta, Anirban email: asengupt@iiti.ac.in organization: Discipline of Comput. Sci. & Eng., Indian Inst. of Technol., Indore, Indore, India – sequence: 2 givenname: Dipanjan surname: Roy fullname: Roy, Dipanjan email: phd1501201007@iiti.ac.in organization: Discipline of Comput. Sci. & Eng., Indian Inst. of Technol., Indore, Indore, India – sequence: 3 givenname: Saraju P. surname: Mohanty fullname: Mohanty, Saraju P. email: Saraju.Mohanty@unt.edu organization: Dept. of Comput. Sci., Univ. of North Texas, Denton, TX, USA – sequence: 4 givenname: Peter surname: Corcoran fullname: Corcoran, Peter email: peter.corcoran@nuigalway.ie organization: Coll. of Eng. & Inf., Nat. Univ. of Ireland Galway, Galway, Ireland |
| BookMark | eNp9kL1PwzAQxS1UJNrCzMBiiTmt7diJM6JQPqRKIFEmhsh27dZVGhfbGfjvcRvEwIBuuOHeu6f3m4BR5zoNwDVGM4xRNV_VixlBuJwhzFBJzsAYM8Yzikk5AmOEKp7lqMgvwCSEHUKYMsLH4OP-7RWudbCbDh68i1pF6zpoO1gvYNx612-2ULQb523c7q2C0YsuGOf34iSUIug1DNH3KvZetNBJ0wd1Ol6CcyPaoK9-9hS8PyxW9VO2fHl8ru-WmSK8ilmFsDRCKKa4xporSopSaslkzoyhDJuKGJ3GSERpRVkhUl0pOSEMyUKifApuh7-pwGevQ2x2rvddimxwxQtKMc-rpJoPKuVdCF6b5uDtXvivBqPmSLBJBJsjwWYgmBzsj0PZeGqWINj2H9_N4LNa698UTmjBCcu_AVbhgOY |
| CODEN | ITCEDA |
| CitedBy_id | crossref_primary_10_1109_TCE_2020_3027760 crossref_primary_10_1109_TCE_2018_2890616 crossref_primary_10_1016_j_vlsi_2023_102114 crossref_primary_10_1109_TCE_2018_2852265 crossref_primary_10_1038_s41598_025_96495_5 crossref_primary_10_1109_ACCESS_2018_2873751 crossref_primary_10_1109_TCE_2018_2852264 crossref_primary_10_1109_ACCESS_2019_2936401 crossref_primary_10_1145_3410337 crossref_primary_10_1109_TCAD_2020_3047976 crossref_primary_10_1109_LES_2023_3327793 crossref_primary_10_1109_TCE_2019_2924049 crossref_primary_10_1109_MDAT_2024_3395981 crossref_primary_10_1109_TCE_2018_2885998 crossref_primary_10_1109_TCE_2021_3105113 crossref_primary_10_1109_MCAS_2023_3325607 crossref_primary_10_3390_computers14070251 crossref_primary_10_1109_TCE_2020_2972808 crossref_primary_10_1109_TVLSI_2023_3253641 crossref_primary_10_3390_electronics12010243 crossref_primary_10_1109_TCE_2019_2944882 crossref_primary_10_1109_TVLSI_2022_3179304 crossref_primary_10_3390_electronics10141656 crossref_primary_10_1109_ACCESS_2019_2963711 crossref_primary_10_1145_3342099 |
| Cites_doi | 10.1109/TIFS.2016.2601067 10.1109/TCAD.2004.828122 10.1049/el.2017.1329 10.1145/2902961.2903000 10.1145/1403375.1403631 10.1109/MCE.2015.2484745 10.1109/TCAD.2016.2597232 10.1109/TVLSI.2014.2323976 10.1109/TCE.2015.7298086 10.1109/ISCAS.2008.4542135 10.1109/ICCE.2009.5012160 10.1109/TCE.2011.5955169 10.1145/2508859.2516656 10.1109/CISIM.2007.51 10.1109/MDT.2010.24 10.1109/TCAD.2009.2028166 10.1109/MCE.2016.2614552 10.1109/ACSSC.2012.6488967 10.1109/TVLSI.2007.896914 10.1109/ICCE-Berlin.2016.7684718 10.1109/ICCCC.2016.7496733 10.1109/TCE.2013.6531127 10.1109/TCE.2009.5373756 10.1109/TVLSI.2015.2437996 10.1109/MCE.2016.2522018 10.1145/2228360.2228377 10.1016/j.future.2017.01.021 10.1109/ACCESS.2016.2552058 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017 |
| DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD F28 FR3 L7M |
| DOI | 10.1109/TCE.2017.015072 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Electronics & Communications Abstracts Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database Advanced Technologies Database with Aerospace |
| DatabaseTitle | CrossRef Engineering Research Database Technology Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Electronics & Communications Abstracts |
| DatabaseTitleList | Engineering Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1558-4127 |
| EndPage | 476 |
| ExternalDocumentID | 10_1109_TCE_2017_015072 8246825 |
| Genre | orig-research |
| GroupedDBID | -~X .DC 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG ACGFO ACIWK ACKIV ACNCT AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IBMZZ ICLAB IFIPE IFJZH IPLJI JAVBF LAI MS~ O9- OCL P2P RIA RIE RNS TAE TN5 VH1 AAYXX CITATION 7SP 8FD F28 FR3 L7M RIG |
| ID | FETCH-LOGICAL-c289t-901bfaac5c8e1e8c4267beb5b35ff451f92fefeffb0449456a109bb82250b6b03 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 45 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000423276800016&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0098-3063 |
| IngestDate | Mon Jun 30 16:10:58 EDT 2025 Sat Nov 29 06:45:09 EST 2025 Tue Nov 18 21:42:11 EST 2025 Wed Aug 27 02:48:10 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c289t-901bfaac5c8e1e8c4267beb5b35ff451f92fefeffb0449456a109bb82250b6b03 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 1986441839 |
| PQPubID | 85469 |
| PageCount | 10 |
| ParticipantIDs | crossref_citationtrail_10_1109_TCE_2017_015072 crossref_primary_10_1109_TCE_2017_015072 ieee_primary_8246825 proquest_journals_1986441839 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-11-01 |
| PublicationDateYYYYMMDD | 2017-11-01 |
| PublicationDate_xml | – month: 11 year: 2017 text: 2017-11-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on consumer electronics |
| PublicationTitleAbbrev | T-CE |
| PublicationYear | 2017 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref34 ref12 ref15 ref31 ref30 ref11 ref32 ref10 wang (ref25) 2016 (ref37) 0 ref2 ref1 ref17 ref16 li (ref6) 2015 (ref35) 0 ref19 ref18 mohanty (ref14) 2015 ref24 ref26 ref20 ref22 ref21 (ref36) 0 koushanfar (ref33) 2012 alkabani (ref23) 2007 ref28 ref27 ref29 ref7 kruni (ref5) 2016 ref9 ref4 ref3 (ref8) 2017 |
| References_xml | – ident: ref18 doi: 10.1109/TIFS.2016.2601067 – ident: ref32 doi: 10.1109/TCAD.2004.828122 – ident: ref29 doi: 10.1049/el.2017.1329 – start-page: 133 year: 2016 ident: ref25 article-title: Secure and low-overhead circuit obfuscation technique with multiplexers publication-title: GLSVLSI doi: 10.1145/2902961.2903000 – year: 2015 ident: ref14 publication-title: Nanoelectronic Mixed-Signal System Design – ident: ref26 doi: 10.1145/1403375.1403631 – ident: ref7 doi: 10.1109/MCE.2015.2484745 – ident: ref34 doi: 10.1109/TCAD.2016.2597232 – ident: ref11 doi: 10.1109/TVLSI.2014.2323976 – ident: ref15 doi: 10.1109/TCE.2015.7298086 – ident: ref9 doi: 10.1109/ISCAS.2008.4542135 – ident: ref4 doi: 10.1109/ICCE.2009.5012160 – ident: ref3 doi: 10.1109/TCE.2011.5955169 – year: 2017 ident: ref8 publication-title: The Economic Impacts of Counterfeiting and Piracy last modified – ident: ref21 doi: 10.1145/2508859.2516656 – year: 0 ident: ref37 publication-title: BDTI DSP Kernel Benchmarks – start-page: 20:1 year: 2007 ident: ref23 article-title: Active Hardware Metering for Intellectual Property Protection and Security publication-title: USENIX Association – year: 0 ident: ref35 publication-title: NanGate 15 nm open cell library – ident: ref19 doi: 10.1109/CISIM.2007.51 – ident: ref28 doi: 10.1109/MDT.2010.24 – start-page: 575 year: 2016 ident: ref5 article-title: Data flow CAD tool for firniware development and power consumption estimation in multicore hearing aids publication-title: Proc IEEE ICCE – ident: ref22 doi: 10.1109/TCAD.2009.2028166 – ident: ref13 doi: 10.1109/MCE.2016.2614552 – ident: ref10 doi: 10.1109/ACSSC.2012.6488967 – ident: ref1 doi: 10.1109/TVLSI.2007.896914 – ident: ref12 doi: 10.1109/ICCE-Berlin.2016.7684718 – ident: ref20 doi: 10.1109/ICCCC.2016.7496733 – ident: ref2 doi: 10.1109/TCE.2013.6531127 – ident: ref17 doi: 10.1109/TCE.2009.5373756 – start-page: 103 year: 2012 ident: ref33 publication-title: Hardware Metering A Survey – year: 0 ident: ref36 publication-title: DSP Benchmark Suite – ident: ref24 doi: 10.1109/TVLSI.2015.2437996 – start-page: 92 year: 2015 ident: ref6 article-title: High efficiency VLSI implementation of an edge-directed video up-scaler using high level synthesis publication-title: Proc IEEE ICCE – ident: ref16 doi: 10.1109/MCE.2016.2522018 – ident: ref27 doi: 10.1145/2228360.2228377 – ident: ref30 doi: 10.1016/j.future.2017.01.021 – ident: ref31 doi: 10.1109/ACCESS.2016.2552058 |
| SSID | ssj0014528 |
| Score | 2.3946252 |
| Snippet | Structural obfuscation offers a means to effectively secure through obfuscation the contents of an intellectual property (IP) cores used in an electronic... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 467 |
| SubjectTerms | Algorithm design and analysis Algorithms Delays Design optimization Digital signal processing Digital signal processing (DSP) core Digital signal processors Hardware high-level transformation Intellectual property IP networks IP protection Microprocessors Particle swarm optimization Reverse engineering Signal processing algorithms Space exploration structural obfuscation System on chip Transformations |
| Title | DSP design protection in CE through algorithmic transformation based structural obfuscation |
| URI | https://ieeexplore.ieee.org/document/8246825 https://www.proquest.com/docview/1986441839 |
| Volume | 63 |
| WOSCitedRecordID | wos000423276800016&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1558-4127 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014528 issn: 0098-3063 databaseCode: RIE dateStart: 19750101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFH5sw4Me_DXF6ZQcPHiwW5umTXqUueFpDJww8FCaNNGCtrJ1_v0maVcm6kF6aeGllPfSvO8l730P4FpQprCKpEOxUA6JBNPrIOMOIRgLN9TPCbPNJuh0yhaLaNaC26YWRkppk8_kwNzas_y0EGuzVTZkmIQ6omlDm9KwqtVqTgxIgNmGH1PDYL-m8fHcaDgfjU0OFx2Y6J7ibx7ItlT5sQ5b5zI5-N9nHcJ-DSLRXWX1I2jJ_Bj2tqgFu_B8_zhDqU3PQDUXg7YAynI0GqO6OQ9K3l6KZVa-vmcClVsIVgsa75aiil3WMHOggqv1qtrfO4GnyXg-enDqRgqO0PFUaVIwuEoSEQgmPcmE9sqUSx5wP1CKBJ6KsJL6UtwlJNKQKtFq41xjh8DlIXf9U-jkRS7PAFFs9k2pcJWSxKdJlKacS08kqQ7keJj2YLBRbixqlnHT7OItttGGG8XaGrGxRlxZowc3zYCPimDjb9GuUX4jVuu9B_2N9eL6B1zFnqGdJwb-nf8-6gJ2zaurssI-dLQ-5SXsiM8yWy2v7Nz6AiRIzmM |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwED_mFNQHv6Y4P_Pggw92a7N0SR5lbkycY-CEgQ-lSRMdzFa2zr_fpO3GRH2QvrRwoeUuzf0uufsdwJWkTGPNlUOx1A7hkpl1kAmHEIyl2zTPIcuaTdB-n41GfFCCm2UtjFIqSz5TNXubneVHiZzbrbI6w6RpIpo1WPeNH3Xzaq3lmQHxMVswZBog3CiIfDyX14etts3iojUb31P8zQdlTVV-rMSZe-ns_u_D9mCngJHoNrf7PpRUfADbK-SCFXi5exqgKEvQQAUbg7EBGseo1UZFex4UTl6T6Th9ex9LlK5gWCNo_VuEcn5Zy82BEqHns3yH7xCeO-1hq-sUrRQcaSKq1CZhCB2G0pdMeYpJ45epUMIXDV9r4nuaY63MpYVLCDegKjRqE8KgB98VTeE2jqAcJ7E6BkSx3Tml0tVakQYNeRQJoTwZRiaUE82oCrWFcgNZ8IzbdheTIIs3XB4YawTWGkFujSpcLwd85BQbf4tWrPKXYoXeq3C2sF5Q_IKzwLPE88QCwJPfR13CZnf42At69_2HU9iyr8mLDM-gbHSrzmFDfqbj2fQim2dfFbjRsA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=DSP+design+protection+in+CE+through+algorithmic+transformation+based+structural+obfuscation&rft.jtitle=IEEE+transactions+on+consumer+electronics&rft.au=Sengupta%2C+Anirban&rft.au=Roy%2C+Dipanjan&rft.au=Mohanty%2C+Saraju+P.&rft.au=Corcoran%2C+Peter&rft.date=2017-11-01&rft.issn=0098-3063&rft.volume=63&rft.issue=4&rft.spage=467&rft.epage=476&rft_id=info:doi/10.1109%2FTCE.2017.015072&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TCE_2017_015072 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0098-3063&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0098-3063&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0098-3063&client=summon |