Results 1 to 10 of about 621 (141)

Hardware functional obfuscation with ferroelectric active interconnects

open access: yesNature Communications, 2022
Hardware security is importance with outsourcing of integrated circuit fabrication to various foundries. Here, the authors propose a compact encryption logic based on the active interconnects constructed with ferroelectric field-effect transistors.
Tongguang Yu   +10 more
doaj   +4 more sources

New Systolic Array Algorithms and VLSI Architectures for 1-D MDST [PDF]

open access: yesSensors, 2023
In this paper, we present two systolic array algorithms for efficient Very-Large-Scale Integration (VLSI) implementations of the 1-D Modified Discrete Sine Transform (MDST) using the systolic array architectural paradigm. The new algorithms decompose the
Doru Florin Chiper, Arcadie Cracan
doaj   +2 more sources

A novel obfuscation method based on majority logic for preventing unauthorized access to binary deep neural networks [PDF]

open access: yesScientific Reports
The significant expansion of deep learning applications has necessitated safeguarding the deep neural network (DNN) model from potential unauthorized access, highlighting its importance as a valuable asset.
Alireza Mohseni   +2 more
doaj   +2 more sources

Key Generation for Hardware Obfuscation Using Strong PUFs [PDF]

open access: yesCryptography, 2019
As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries.
Md Shahed Enamul Quadir   +1 more
doaj   +2 more sources

Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences [PDF]

open access: yesJournal of Multidisciplinary Healthcare
Agila Harshini T, Harini Sriraman Department of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, IndiaCorrespondence: Harini Sriraman, Vellore Institute of Technology, Chennai Campus, Vandalur- Kelambakkam Road ...
T AH, Sriraman H
doaj   +2 more sources

Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj   +3 more sources

A Novel Probability-Based Logic-Locking Technique: ProbLock

open access: yesSensors, 2021
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit.
Michael Yue, Sara Tehranipoor
doaj   +1 more source

ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

open access: yesIEEE Access, 2023
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes.
M. Sazadur Rahman   +5 more
doaj   +1 more source

Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques

open access: yesEmitter: International Journal of Engineering Technology, 2022
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency.
Thejaswini P   +5 more
doaj   +1 more source

LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based FPGAs is a persistent problem without a satisfying solution in practice.
Florian Stolz   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy