Results 1 to 10 of about 10,729 (176)

Hardware functional obfuscation with ferroelectric active interconnects

open access: yesNature Communications, 2022
Hardware security is importance with outsourcing of integrated circuit fabrication to various foundries. Here, the authors propose a compact encryption logic based on the active interconnects constructed with ferroelectric field-effect transistors.
Tongguang Yu   +10 more
doaj   +4 more sources

On the Difficulty of FSM-based Hardware Obfuscation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy.
Marc Fyrbiak   +6 more
doaj   +4 more sources

CodeTrolley: Hardware-Assisted Control Flow Obfuscation [PDF]

open access: yesCoRR, 2019
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak   +2 more
core   +3 more sources

ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

open access: yesIEEE Access, 2023
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes.
M. Sazadur Rahman   +5 more
doaj   +3 more sources

New Systolic Array Algorithms and VLSI Architectures for 1-D MDST [PDF]

open access: yesSensors, 2023
In this paper, we present two systolic array algorithms for efficient Very-Large-Scale Integration (VLSI) implementations of the 1-D Modified Discrete Sine Transform (MDST) using the systolic array architectural paradigm. The new algorithms decompose the
Doru Florin Chiper, Arcadie Cracan
doaj   +2 more sources

A novel obfuscation method based on majority logic for preventing unauthorized access to binary deep neural networks [PDF]

open access: yesScientific Reports
The significant expansion of deep learning applications has necessitated safeguarding the deep neural network (DNN) model from potential unauthorized access, highlighting its importance as a valuable asset.
Alireza Mohseni   +2 more
doaj   +2 more sources

Key Generation for Hardware Obfuscation Using Strong PUFs

open access: yesCryptography, 2019
As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries.
Md Shahed Enamul Quadir   +1 more
doaj   +3 more sources

Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences [PDF]

open access: yesJournal of Multidisciplinary Healthcare
Agila Harshini T, Harini Sriraman Department of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, IndiaCorrespondence: Harini Sriraman, Vellore Institute of Technology, Chennai Campus, Vandalur- Kelambakkam Road ...
T AH, Sriraman H
doaj   +2 more sources

Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj   +3 more sources

A Novel Probability-Based Logic-Locking Technique: ProbLock

open access: yesSensors, 2021
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit.
Michael Yue, Sara Tehranipoor
doaj   +1 more source

Home - About - Disclaimer - Privacy