Results 101 to 110 of about 621 (141)
A Deep Learning Framework for Enhancing High-Frequency Optical Fiber Vibration Sensing from Low-Sampling-Rate FBG Interrogators. [PDF]
Jati MP +6 more
europepmc +1 more source
Intelligent recognition of counterfeit goods text based on BERT and multimodal feature fusion. [PDF]
Wang T, Li Y, Li W, Zhou L, Luo N.
europepmc +1 more source
NTRU-MCF: A Chaos-Enhanced Multidimensional Lattice Signature Scheme for Post-Quantum Cryptography. [PDF]
Wang R, Yuan B, Yuan M, Li Y.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
HOP: Hardware makes Obfuscation Practical
Proceedings 2017 Network and Distributed System Security Symposium, 2017Program obfuscation is a central primitive in cryptography, and has important real-world applications in protecting software from IP theft. However, well known results from the cryptographic literature have shown that software only virtual black box (VBB) obfuscation of general programs is impossible.
Kartik Nayak +6 more
openaire +1 more source
Hardware Obfuscation Using Strong PUFs
2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2018IC piracy is a significant security threat, where malicious manufacturers can produce unauthorized extra chips and/or steal the information of a design through reverse engineering attempts. As a countermeasure, hardware obfuscation schemes usually withhold a part of the design (which thereafter constitutes the "key") by replacing it with configurable ...
Soroush Khaleghi, Wenjing Rao
openaire +1 more source
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2019Existing logic obfuscation approaches aim to protect hardware design IPs from SAT attack by increasing query count and output corruptibility of a locked netlist. In this paper, we demonstrate the ineffectiveness of such techniques to obfuscate hardware accelerator platforms.
Abhishek Chakraborty, Ankur Srivastava
openaire +1 more source
Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs
2017In recent years, hardware obfuscation is one of the prominent anti-tamper solutions that are highly used against various hardware security threats such as piracy, cloning, reverse engineering, chip overbuilding, and hardware Trojans. Logic obfuscation is implemented either in the design description (for soft/firm/hard codes) or structure (for the chip)
Sumathi G. +4 more
openaire +1 more source
Hardware Obfuscation Techniques on FPGA-Based Systems
2020 IEEE East-West Design & Test Symposium (EWDTS), 2020There is a great variety of hardware Trojan detection and prevention approaches. However, state of art approaches cannot provide a full guarantee that an integrated circuit or complex electronic system is free of hardware Trojan. We introduced a reference monitor obfuscation approach on the base of formal transformations of structural system models ...
Valeriy Gorbachov +3 more
openaire +1 more source
Hardware-assisted code obfuscation
2014Software obfuscation is a longstanding and open research challenge in computer security. While theoretical results indicate that provably secure obfuscation in general is impossible to achieve, many application areas (e.g. malware, commercial software, etc.) show that software obfuscation is indeed employed in practice.
openaire +1 more source
VLSI Test and Hardware Security Background for Hardware Obfuscation
2017This chapter discusses the fundamental concepts of design and testing and their role in hardware obfuscation. It outlines the traditional design flow of integrated circuits and assesses the vulnerabilities associated with the verification techniques and testing structures that can expose the design details and help reverse-engineer the functionality. A
Fareena Saqib, Jim Plusquellic
openaire +1 more source

