Architectural Synthesis Techniques for Design of Correct and Secure ICs
Main Author: | |
---|---|
Language: | English |
Published: |
University of Cincinnati / OhioLINK
2008
|
Subjects: | |
Online Access: | http://rave.ohiolink.edu/etdc/view?acc_num=ucin1217424117 |
id |
ndltd-OhioLink-oai-etd.ohiolink.edu-ucin1217424117 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-OhioLink-oai-etd.ohiolink.edu-ucin12174241172021-08-03T06:12:52Z Architectural Synthesis Techniques for Design of Correct and Secure ICs Sundaresan, Vijay Computer Science Integrated Circuit Design EDA CAD for VLSI Cryptographic Hardware Design Secure Embedded Systems Architectural Synthesis <p>Integrated Circuits (ICs) are widely used in all applications and industries like smart cards, cell phones, set-top boxes, automobiles, avionics, space exploration and bio-instrumentation, to name a few. Traditional IC design flows and architectural synthesis techniques have been developed primarily for area, power and performance optimization. In recent years, as we move into the nanometer semiconductor process era, the ability to integrate large and complex applications on a single semiconductor die coupled with the all pervasive nature of the technology and its impact on our daily lives, have brought into prominence two important IC optimization constraints: <i>Security</i> and <i>Correctness</i>.</p><p>In this thesis, we have developed novel architectural synthesis techniques at cell-level, circuit-level and algorithmic-level, in a hierarchical standard-cell-based IC design framework, to design correct and secure ICs. Formulation as a hierarchical framework allows efficient partitioning of the design problem into several clearly-defined design steps at various levels of abstractions, with a clear understanding of each design step and ability to incorporate the requirements of subsequent design steps. Furthermore, unlike naive security-centric IC design flows where security and IC implementation constraints (area, power and performance) are typically considered as orthogonal and often conflicting optimization goals, in this thesis, we developed a novel paradigm that could be used to simultaneously optimize security as well as IC implementation constraints (area and power), at various hierarchical levels of IC design. Together, these architectural synthesis techniques fit well in today's highly productive modular IC design flows, and thus efficiently design correct and secure ICs.</p> 2008 English text University of Cincinnati / OhioLINK http://rave.ohiolink.edu/etdc/view?acc_num=ucin1217424117 http://rave.ohiolink.edu/etdc/view?acc_num=ucin1217424117 unrestricted This thesis or dissertation is protected by copyright: all rights reserved. It may not be copied or redistributed beyond the terms of applicable copyright laws. |
collection |
NDLTD |
language |
English |
sources |
NDLTD |
topic |
Computer Science Integrated Circuit Design EDA CAD for VLSI Cryptographic Hardware Design Secure Embedded Systems Architectural Synthesis |
spellingShingle |
Computer Science Integrated Circuit Design EDA CAD for VLSI Cryptographic Hardware Design Secure Embedded Systems Architectural Synthesis Sundaresan, Vijay Architectural Synthesis Techniques for Design of Correct and Secure ICs |
author |
Sundaresan, Vijay |
author_facet |
Sundaresan, Vijay |
author_sort |
Sundaresan, Vijay |
title |
Architectural Synthesis Techniques for Design of Correct and Secure ICs |
title_short |
Architectural Synthesis Techniques for Design of Correct and Secure ICs |
title_full |
Architectural Synthesis Techniques for Design of Correct and Secure ICs |
title_fullStr |
Architectural Synthesis Techniques for Design of Correct and Secure ICs |
title_full_unstemmed |
Architectural Synthesis Techniques for Design of Correct and Secure ICs |
title_sort |
architectural synthesis techniques for design of correct and secure ics |
publisher |
University of Cincinnati / OhioLINK |
publishDate |
2008 |
url |
http://rave.ohiolink.edu/etdc/view?acc_num=ucin1217424117 |
work_keys_str_mv |
AT sundaresanvijay architecturalsynthesistechniquesfordesignofcorrectandsecureics |
_version_ |
1719432840760786944 |