I have contributed in the development of hardware security tools during my PhD.
KHC-STEGO: Key Driven HASH Chaining based Steganography
Based on Publication:
M. Rathor and A. Sengupta, “IP Core Steganography Using Switch Based Key-Driven Hash-Chaining and Encoding for Securing DSP Kernels Used in CE Systems,” IEEE Transactions on Consumer Electronics, vol. 66, no. 3, pp. 251-260, Aug. 2020.
Tool available at: https://cadforassurance.org/ hosted by University of south Florida and IEEE CEDA
Structural Obfuscation Using Pseudo Operations Mixing
Based on Publication:
M. Rathor and A. Sengupta, “Obfuscating DSP Hardware Accelerators in CE Systems Using Pseudo Operations Mixing”, Proceedings of IEEE International Conference on Zooming Innovation in Consumer Electronics (ZINC), Serbia, 2020, pp. 218-221.
Based on Publication:
A. Sengupta and M. Rathor, "Facial Biometric for Securing Hardware Accelerators," in IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 29, no. 1, pp. 112-123, Jan. 2021, doi: 10.1109/TVLSI.2020.3029245.
Tool available at: https://cadforassurance.org/ hosted by University of south Florida and IEEE CEDA.