Hardware functional obfuscation with ferroelectric active interconnects
Hardware security is importance with outsourcing of integrated circuit fabrication to various foundries. Here, the authors propose a compact encryption logic based on the active interconnects constructed with ferroelectric field-effect transistors.
Tongguang Yu +10 more
doaj +4 more sources
New Systolic Array Algorithms and VLSI Architectures for 1-D MDST [PDF]
In this paper, we present two systolic array algorithms for efficient Very-Large-Scale Integration (VLSI) implementations of the 1-D Modified Discrete Sine Transform (MDST) using the systolic array architectural paradigm. The new algorithms decompose the
Doru Florin Chiper, Arcadie Cracan
doaj +2 more sources
A novel obfuscation method based on majority logic for preventing unauthorized access to binary deep neural networks [PDF]
The significant expansion of deep learning applications has necessitated safeguarding the deep neural network (DNN) model from potential unauthorized access, highlighting its importance as a valuable asset.
Alireza Mohseni +2 more
doaj +2 more sources
Key Generation for Hardware Obfuscation Using Strong PUFs [PDF]
As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries.
Md Shahed Enamul Quadir +1 more
doaj +2 more sources
Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences [PDF]
Agila Harshini T, Harini Sriraman Department of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, IndiaCorrespondence: Harini Sriraman, Vellore Institute of Technology, Chennai Campus, Vandalur- Kelambakkam Road ...
T AH, Sriraman H
doaj +2 more sources
Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj +3 more sources
A Novel Probability-Based Logic-Locking Technique: ProbLock
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit.
Michael Yue, Sara Tehranipoor
doaj +1 more source
ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes.
M. Sazadur Rahman +5 more
doaj +1 more source
Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency.
Thejaswini P +5 more
doaj +1 more source
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based FPGAs is a persistent problem without a satisfying solution in practice.
Florian Stolz +9 more
doaj +1 more source

