Results 101 to 110 of about 621 (141)

HOP: Hardware makes Obfuscation Practical

Proceedings 2017 Network and Distributed System Security Symposium, 2017
Program obfuscation is a central primitive in cryptography, and has important real-world applications in protecting software from IP theft. However, well known results from the cryptographic literature have shown that software only virtual black box (VBB) obfuscation of general programs is impossible.
Kartik Nayak   +6 more
openaire   +1 more source

Hardware Obfuscation Using Strong PUFs

2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2018
IC piracy is a significant security threat, where malicious manufacturers can produce unauthorized extra chips and/or steal the information of a design through reverse engineering attempts. As a countermeasure, hardware obfuscation schemes usually withhold a part of the design (which thereafter constitutes the "key") by replacing it with configurable ...
Soroush Khaleghi, Wenjing Rao
openaire   +1 more source

Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators

2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2019
Existing logic obfuscation approaches aim to protect hardware design IPs from SAT attack by increasing query count and output corruptibility of a locked netlist. In this paper, we demonstrate the ineffectiveness of such techniques to obfuscate hardware accelerator platforms.
Abhishek Chakraborty, Ankur Srivastava
openaire   +1 more source

Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs

2017
In recent years, hardware obfuscation is one of the prominent anti-tamper solutions that are highly used against various hardware security threats such as piracy, cloning, reverse engineering, chip overbuilding, and hardware Trojans. Logic obfuscation is implemented either in the design description (for soft/firm/hard codes) or structure (for the chip)
Sumathi G.   +4 more
openaire   +1 more source

Hardware Obfuscation Techniques on FPGA-Based Systems

2020 IEEE East-West Design & Test Symposium (EWDTS), 2020
There is a great variety of hardware Trojan detection and prevention approaches. However, state of art approaches cannot provide a full guarantee that an integrated circuit or complex electronic system is free of hardware Trojan. We introduced a reference monitor obfuscation approach on the base of formal transformations of structural system models ...
Valeriy Gorbachov   +3 more
openaire   +1 more source

Hardware-assisted code obfuscation

2014
Software obfuscation is a longstanding and open research challenge in computer security. While theoretical results indicate that provably secure obfuscation in general is impossible to achieve, many application areas (e.g. malware, commercial software, etc.) show that software obfuscation is indeed employed in practice.
openaire   +1 more source

VLSI Test and Hardware Security Background for Hardware Obfuscation

2017
This chapter discusses the fundamental concepts of design and testing and their role in hardware obfuscation. It outlines the traditional design flow of integrated circuits and assesses the vulnerabilities associated with the verification techniques and testing structures that can expose the design details and help reverse-engineer the functionality. A
Fareena Saqib, Jim Plusquellic
openaire   +1 more source

Home - About - Disclaimer - Privacy