Results 111 to 120 of about 621 (141)
Some of the next articles are maybe not open access.

Hardware obfuscation for IP protection

2020
The horizontal business model adopted by the semiconductor industry has resulted in a manufacturing process that has integrated various foreign entities focusing on individual production steps. However, serious trust issues have emerged with the internationalization of the semiconductor supply chain, and the trust concerns grow further with the ...
openaire   +1 more source

Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection

2017
The globalized semiconductor supply chain make integrated circuits (ICs) potentially suffer from diverse security threats. Among different hardware attacks, Trojan horse insertion has emerged as a major security concern. To mitigate the hardware Trojan insertion happened in the late stage of IC supply chain, researchers recognize that hardware ...
Qiaoyan Yu   +3 more
openaire   +1 more source

Exploiting hardware obfuscation methods to prevent and detect hardware Trojans

2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), 2017
Due to the globalized semiconductor supply chain, integrated circuits suffer from hardware security attacks. Among various attacks, hardware Trojan insertions have emerged as a major security concern. An adversary modifies the original circuit to accomplish the malicious intentions through the hardware Trojan. Hardware obfuscation has been demonstrated
Qiaoyan Yu, Jaya Dofe, Zhiming Zhang
openaire   +1 more source

Hardware Protection through Obfuscation

2017
This book introduces readers to various threats faced during design and fabrication by todays integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or IC Overproduction, insertion of malicious circuits, referred as Hardware Trojans, which cause in-field chip/system malfunction, and reverse ...
openaire   +1 more source

Hardware Obfuscation and Logic Locking: A Tutorial Introduction

IEEE Design & Test, 2020
Editor’s note : If you are designing or integrating hardware IP blocks into your designs, and you are using common global supply chains, then reading this overview article on how to protect your IP against reverse engineering, piracy, and malicious alteration attacks is a must.
Tamzidul Hoque   +2 more
openaire   +1 more source

A Perceptron-Inspired Technique for Hardware Obfuscation

2018 19th International Workshop on Microprocessor and SOC Test and Verification (MTV), 2018
Outsourcing the manufacture of integrated circuits (IC) boosts efficiency in terms of production timeline and minimizing expenditures. However, it results in security challenges, as there is uncertainty in the reliability of the foundry that is responsible for the IC fabrication.
Siroos Madani   +2 more
openaire   +1 more source

Hardware Obfuscation: Techniques and Open Challenges

2017
While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation. The main aim of this paper is to start a discussion about hardware obfuscation in the academic community and point out open research problems. In particular, we introduce a very flexible layout-level obfuscation tool that we
Georg T. Becker   +2 more
openaire   +1 more source

Circuit Design Obfuscation for Hardware Security

2018
Nowadays, chip design and chip fabrication are normally conducted separately by independent companies. Most integrated circuit (IC) design companies are now adopting a fab-less model: they outsource the chip fabrication to offshore foundries while concentrating their effort and resource on the chip design.
openaire   +2 more sources

Hardware assisted control flow obfuscation for embedded processors

Proceedings of the 2004 international conference on Compilers, architecture, and synthesis for embedded systems, 2004
With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transaction terminals, pay-TV access-control decoders, where adversaries may easily gain full physical accesses to the systems and critical algorithms must be protected from being ...
Xiaotong Zhuang   +3 more
openaire   +1 more source

On Obfuscating Programs with Tamper-proof Hardware

2011
In recent years, theoretical cryptography community has focused on a fascinating research line of obfuscating programs (circuits). Loosely speaking, obfuscating a program P is to construct a new program which can preserve P's functionality, but its code is fully "unintelligent".
Ning Ding, Dawu Gu
openaire   +1 more source

Home - About - Disclaimer - Privacy