Hardware functional obfuscation with ferroelectric active interconnects
Hardware security is importance with outsourcing of integrated circuit fabrication to various foundries. Here, the authors propose a compact encryption logic based on the active interconnects constructed with ferroelectric field-effect transistors.
Tongguang Yu +10 more
doaj +4 more sources
On the Difficulty of FSM-based Hardware Obfuscation
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy.
Marc Fyrbiak +6 more
doaj +4 more sources
CodeTrolley: Hardware-Assisted Control Flow Obfuscation [PDF]
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak +2 more
core +3 more sources
ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes.
M. Sazadur Rahman +5 more
doaj +3 more sources
New Systolic Array Algorithms and VLSI Architectures for 1-D MDST [PDF]
In this paper, we present two systolic array algorithms for efficient Very-Large-Scale Integration (VLSI) implementations of the 1-D Modified Discrete Sine Transform (MDST) using the systolic array architectural paradigm. The new algorithms decompose the
Doru Florin Chiper, Arcadie Cracan
doaj +2 more sources
A novel obfuscation method based on majority logic for preventing unauthorized access to binary deep neural networks [PDF]
The significant expansion of deep learning applications has necessitated safeguarding the deep neural network (DNN) model from potential unauthorized access, highlighting its importance as a valuable asset.
Alireza Mohseni +2 more
doaj +2 more sources
Key Generation for Hardware Obfuscation Using Strong PUFs
As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries.
Md Shahed Enamul Quadir +1 more
doaj +3 more sources
Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences [PDF]
Agila Harshini T, Harini Sriraman Department of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, IndiaCorrespondence: Harini Sriraman, Vellore Institute of Technology, Chennai Campus, Vandalur- Kelambakkam Road ...
T AH, Sriraman H
doaj +2 more sources
Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj +3 more sources
A Novel Probability-Based Logic-Locking Technique: ProbLock
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit.
Michael Yue, Sara Tehranipoor
doaj +1 more source

