Untrusted Third Party Digital IP Cores: Power-Delay Trade-off Driven Exploration of Hardware Trojan Secured Datapath during High Level Synthesis.
Anirban SenguptaSaumya BhadauriaPublished in: ACM Great Lakes Symposium on VLSI (2015)
Keyphrases
- third party
- trade off
- high level synthesis
- design space exploration
- parallel architecture
- wireless access networks
- power consumption
- multi core processors
- ibm power processor
- processor core
- sensitive information
- clock frequency
- reverse logistics
- hardware implementation
- computer architecture
- power dissipation
- computer systems
- image processing
- central processing unit
- mashup
- multithreading
- design process
- ip address
- information security
- design space
- massively parallel
- parallel processing