Results 1 to 10 of about 776,400 (220)

Key Generation for Hardware Obfuscation Using Strong PUFs [PDF]

open access: yesCryptography, 2019
As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries.
Md Shahed Enamul Quadir   +1 more
doaj   +3 more sources

ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

open access: yesIEEE Access, 2023
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes.
M. Sazadur Rahman   +5 more
doaj   +2 more sources

Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification

open access: yesInternational Journal of Reconfigurable Computing, 2023
As the reuse of IP cores or the development of frequently used hardware modules is gaining more attention in the semiconductor industry, the misappropriation of the owner’s identity is a rising concern.
Priyanka Bagul, Vandana Inamdar
doaj   +2 more sources

Hardware functional obfuscation with ferroelectric active interconnects

open access: yesNature Communications, 2022
Hardware security is importance with outsourcing of integrated circuit fabrication to various foundries. Here, the authors propose a compact encryption logic based on the active interconnects constructed with ferroelectric field-effect transistors.
Tongguang Yu   +10 more
doaj   +4 more sources

Hardware Obfuscation of Digital FIR Filters [PDF]

open access: yes2022 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), 2022
A finite impulse response (FIR) filter is a ubiquitous block in digital signal processing applications. Its characteristics are determined by its coefficients, which are the intellectual property (IP) for its designer. However, in a hardware efficient realization, its coefficients become vulnerable to reverse engineering.
Aksoy, Levent   +3 more
openaire   +3 more sources

Code trolley: hardware-assisted control flow obfuscation [PDF]

open access: yes, 2020
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak   +2 more
core   +4 more sources

Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis

open access: yesComputers
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh   +4 more
doaj   +2 more sources

On the Difficulty of FSM-based Hardware Obfuscation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy.
Marc Fyrbiak   +6 more
doaj   +2 more sources

New Systolic Array Algorithms and VLSI Architectures for 1-D MDST [PDF]

open access: yesSensors, 2023
In this paper, we present two systolic array algorithms for efficient Very-Large-Scale Integration (VLSI) implementations of the 1-D Modified Discrete Sine Transform (MDST) using the systolic array architectural paradigm. The new algorithms decompose the
Doru Florin Chiper, Arcadie Cracan
doaj   +2 more sources

A novel obfuscation method based on majority logic for preventing unauthorized access to binary deep neural networks [PDF]

open access: yesScientific Reports
The significant expansion of deep learning applications has necessitated safeguarding the deep neural network (DNN) model from potential unauthorized access, highlighting its importance as a valuable asset.
Alireza Mohseni   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy