Results 1 to 10 of about 776,400 (220)
Key Generation for Hardware Obfuscation Using Strong PUFs [PDF]
As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries.
Md Shahed Enamul Quadir +1 more
doaj +3 more sources
ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes.
M. Sazadur Rahman +5 more
doaj +2 more sources
Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification
As the reuse of IP cores or the development of frequently used hardware modules is gaining more attention in the semiconductor industry, the misappropriation of the owner’s identity is a rising concern.
Priyanka Bagul, Vandana Inamdar
doaj +2 more sources
Hardware functional obfuscation with ferroelectric active interconnects
Hardware security is importance with outsourcing of integrated circuit fabrication to various foundries. Here, the authors propose a compact encryption logic based on the active interconnects constructed with ferroelectric field-effect transistors.
Tongguang Yu +10 more
doaj +4 more sources
Hardware Obfuscation of Digital FIR Filters [PDF]
A finite impulse response (FIR) filter is a ubiquitous block in digital signal processing applications. Its characteristics are determined by its coefficients, which are the intellectual property (IP) for its designer. However, in a hardware efficient realization, its coefficients become vulnerable to reverse engineering.
Aksoy, Levent +3 more
openaire +3 more sources
Code trolley: hardware-assisted control flow obfuscation [PDF]
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak +2 more
core +4 more sources
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh +4 more
doaj +2 more sources
On the Difficulty of FSM-based Hardware Obfuscation
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy.
Marc Fyrbiak +6 more
doaj +2 more sources
New Systolic Array Algorithms and VLSI Architectures for 1-D MDST [PDF]
In this paper, we present two systolic array algorithms for efficient Very-Large-Scale Integration (VLSI) implementations of the 1-D Modified Discrete Sine Transform (MDST) using the systolic array architectural paradigm. The new algorithms decompose the
Doru Florin Chiper, Arcadie Cracan
doaj +2 more sources
A novel obfuscation method based on majority logic for preventing unauthorized access to binary deep neural networks [PDF]
The significant expansion of deep learning applications has necessitated safeguarding the deep neural network (DNN) model from potential unauthorized access, highlighting its importance as a valuable asset.
Alireza Mohseni +2 more
doaj +2 more sources

