<?xml version="1.0" encoding="utf-8"?><rss version="2.0"><channel><title>Anirban Sengupta</title><link>https://shop.theiet.org:443/author/anirban-sengupta</link><description>Anirban Sengupta</description><item><title>High-Level Synthesis Hardware Trojan Attacks and Countermeasures</title><link>https://shop.theiet.org:443/high-level-synthesis-hardware-trojan-attacks-and-countermeasures</link><description>&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;Hardware trojans - which involve malicious modification of integrated circuits (ICs) during the design or fabrication stage - can give access to sensitive information, deny service, and so on. They can be difficult to detect but have serious consequences for the security of the IC.&lt;/p&gt;
&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;Exploring hardware trojan attacks and their countermeasures using high level synthesis (HLS), this book covers different attack strategies, their detection and countermeasures, as well as future risks.&lt;/p&gt;
&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;The expert author presents key information on hardware trojan attacks and their countermeasures. The book is split into four parts, starting with an introduction to hardware trojans and high-level synthesis, and then looking at various attack strategies. This is then followed by information on detection (a key issue in hardware trojan security), and countermeasures. The book finishes by looking at additional concerns and future directions of this key area in hardware security.&lt;/p&gt;
&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;Readers will learn about topics such as hardware trojan classification and taxonomy, trojan attacks using malicious HLS framework, time bomb HLS-based hardware trojan attacks, trojan attacks on ML accelerator designs, other payloads of HLS trojan attack, trojan detection technique using DMR, and trojan detection and isolation technique and compromising IP designs via malicious exploitation of commercial CAD-HLS tools.&lt;/p&gt;
&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;&lt;i&gt;High-Level Synthesis Hardware Trojan Attacks and Countermeasures&lt;/i&gt; is a key resource for researchers and engineers working in hardware security and chip design.&lt;/p&gt;</description><pubDate>Wed, 11 Feb 2026 15:04:49 GMT</pubDate><guid isPermaLink="true">https://shop.theiet.org:443/high-level-synthesis-hardware-trojan-attacks-and-countermeasures</guid></item><item><title>High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection</title><link>https://shop.theiet.org:443/high-level-synthesis-based-methodologies-for-hardware-security-trust-and-ip-protection</link><description>&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;&lt;i&gt;High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection&lt;/i&gt; presents state-of-the art high-level synthesis methodologies for hardware security and trust, including IP protection through synthesis-based watermarking and structural obfuscation.&lt;/p&gt;
&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;All modern electronic gadgets have complex system-on-chips (SoCs) that rely heavily on data intensive application specific processors, for digital signal processing (DSP), machine learning, and image processing applications. These data-intensive cores, in the form of intellectual property (IP), form an integral part of various modern equipment and consumer applications, such as smart phones, smart watches, and tablets.&lt;/p&gt;
&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;High level synthesis (HLS) frameworks play a pivotal role in designing these application specific processors. However, the design of such processors can be exposed to several trust issues and hardware security threats, such as IP piracy, fraud IP ownership, and reverse engineering.&lt;/p&gt;
&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;Written by an expert author, this book is a source of information for readers on HLS solutions for hardware security. It covers topics such as HLS-based watermarking using retinal biometrics, HLS-based structural obfuscation, and detective countermeasure against HLS-based hardware Trojan attacks.&lt;/p&gt;
&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;This book is a useful resource for researchers, graduate students, and practising engineers working in electronics and chip design.&lt;/p&gt;</description><pubDate>Tue, 11 Jun 2024 14:50:41 GMT</pubDate><guid isPermaLink="true">https://shop.theiet.org:443/high-level-synthesis-based-methodologies-for-hardware-security-trust-and-ip-protection</guid></item><item><title>Physical Biometrics for Hardware Security of DSP and Machine Learning Coprocessors</title><link>https://shop.theiet.org:443/physical-biometrics-for-hardware-security-of-dsp-and-machine-learning-coprocessors</link><description>&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;&lt;i&gt;Physical Biometrics for Hardware Security of DSP and Machine Learning Coprocessors&lt;/i&gt; presents state-of-the art explanations for detective control-based security and protection of digital signal processing (DSP) and machine learning coprocessors against hardware threats. Such threats include intellectual property (IP) abuse and misuse, for example, fraudulent claims of IP ownership and IP piracy. DSP coprocessors such as finite impulse response filters, image processing filters, discrete Fourier transform, and JPEG compression hardware are extensively utilized in several real-life applications. Further, machine learning coprocessors such as convolutional neural network (CNN) hardware IP cores play a vital role in several applications such as face recognition, medical imaging, autonomous driving, and biometric authentication, amongst others.&lt;/p&gt;
&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;Written by an expert in the field, this book reviews recent advances in hardware security and IP protection of digital signal processing (DSP) and machine learning coprocessors using physical biometrics and DNA. It presents solutions for secured coprocessors for DSP, image processing applications and CNN, and where relevant chapters explores the advantages, disadvantages and security-cost trade-offs between different approaches and techniques to assist in the practical application of these methods.&lt;/p&gt;
&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;The interdisciplinary themes and topics covered are expected to be of interest to researchers in several areas of specialisation, encompassing the overlapping fields of hardware design security, VLSI design (high level synthesis, register transfer level, gate level synthesis), IP core, optimization using evolutionary computing, system-on-chip design, and biometrics. CAD/design engineers, system architects and students will also find this book to be a useful resource.&lt;/p&gt;</description><pubDate>Fri, 03 Mar 2023 14:06:19 GMT</pubDate><guid isPermaLink="true">https://shop.theiet.org:443/physical-biometrics-for-hardware-security-of-dsp-and-machine-learning-coprocessors</guid></item><item><title>Secured Hardware Accelerators for DSP and Image Processing Applications</title><link>https://shop.theiet.org:443/secured-hardware-accelerators-for-dsp-and-image-processing-applications</link><description>&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;Written by an acknowledged expert in the field, this book focuses on approaches for designing secure hardware accelerators for digital signal processing and image processing, which are also optimised for performance and efficiency. State-of-the art security and optimization algorithms are presented, and their roles in the design of secured hardware accelerators for DSP, multimedia and image processing applications are explored.&lt;/p&gt;
&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;The book begins with an introduction to the principles of secured and optimized hardware accelerators for DSP and image processing applications. The following topics are then given thorough and systematic coverage: cryptography driven IP steganography for DSP hardware accelerators; double line of defence to secure JPEG codec hardware for medical imaging systems; integrating multi-key based structural obfuscation and low-level watermarking for double line of defence of DSP hardware accelerators; multimodal hardware accelerators for image processing filters; fingerprint biometric for securing hardware accelerators; key-triggered hash-chaining based encoded hardware steganography for Securing DSP hardware accelerators; designing &lt;i&gt;N&lt;/i&gt;-point DFT hardware accelerator using obfuscation and steganography; and structural transformation and obfuscation frameworks for data-intensive IPs.&lt;/p&gt;
&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;Intended primarily for researchers and practicing engineers, the book will also be of interest to graduate students with a particular interest in hardware device security.&lt;/p&gt;</description><pubDate>Thu, 06 Aug 2020 10:42:44 GMT</pubDate><guid isPermaLink="true">https://shop.theiet.org:443/secured-hardware-accelerators-for-dsp-and-image-processing-applications</guid></item><item><title>Frontiers in Securing IP Cores</title><link>https://shop.theiet.org:443/frontiers-in-securing-ip-cores</link><description>&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies. The theme is important to researchers in various areas of specialization, because it encompasses the overlapping topics of EDA-CAD, hardware design security, VLSI design, IP core protection, optimization using evolutionary computing, system-on-chip design and finally application specific processor/hardware accelerator design for consumer electronics applications.&lt;/p&gt;
&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;The book begins by introducing forensic detective control and obfuscation mechanisms for hardware and IP core security. Further chapters cover hardware stenography, digital signature driven hardware authentication, fault-secured IP cores using digital signature-based watermarks, multi-level watermarking, cryptosystem-based multi-variable fingerprinting, multi-phase and hologram-based obfuscation, and security of functionally obfuscated DSP cores.&lt;/p&gt;</description><pubDate>Wed, 07 Aug 2019 13:45:21 GMT</pubDate><guid isPermaLink="true">https://shop.theiet.org:443/frontiers-in-securing-ip-cores</guid></item></channel></rss>