Results 111 to 120 of about 621 (141)
Some of the next articles are maybe not open access.
Hardware obfuscation for IP protection
2020The horizontal business model adopted by the semiconductor industry has resulted in a manufacturing process that has integrated various foreign entities focusing on individual production steps. However, serious trust issues have emerged with the internationalization of the semiconductor supply chain, and the trust concerns grow further with the ...
openaire +1 more source
Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection
2017The globalized semiconductor supply chain make integrated circuits (ICs) potentially suffer from diverse security threats. Among different hardware attacks, Trojan horse insertion has emerged as a major security concern. To mitigate the hardware Trojan insertion happened in the late stage of IC supply chain, researchers recognize that hardware ...
Qiaoyan Yu +3 more
openaire +1 more source
Exploiting hardware obfuscation methods to prevent and detect hardware Trojans
2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), 2017Due to the globalized semiconductor supply chain, integrated circuits suffer from hardware security attacks. Among various attacks, hardware Trojan insertions have emerged as a major security concern. An adversary modifies the original circuit to accomplish the malicious intentions through the hardware Trojan. Hardware obfuscation has been demonstrated
Qiaoyan Yu, Jaya Dofe, Zhiming Zhang
openaire +1 more source
Hardware Protection through Obfuscation
2017This book introduces readers to various threats faced during design and fabrication by todays integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or IC Overproduction, insertion of malicious circuits, referred as Hardware Trojans, which cause in-field chip/system malfunction, and reverse ...
openaire +1 more source
Hardware Obfuscation and Logic Locking: A Tutorial Introduction
IEEE Design & Test, 2020Editor’s note : If you are designing or integrating hardware IP blocks into your designs, and you are using common global supply chains, then reading this overview article on how to protect your IP against reverse engineering, piracy, and malicious alteration attacks is a must.
Tamzidul Hoque +2 more
openaire +1 more source
A Perceptron-Inspired Technique for Hardware Obfuscation
2018 19th International Workshop on Microprocessor and SOC Test and Verification (MTV), 2018Outsourcing the manufacture of integrated circuits (IC) boosts efficiency in terms of production timeline and minimizing expenditures. However, it results in security challenges, as there is uncertainty in the reliability of the foundry that is responsible for the IC fabrication.
Siroos Madani +2 more
openaire +1 more source
Hardware Obfuscation: Techniques and Open Challenges
2017While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation. The main aim of this paper is to start a discussion about hardware obfuscation in the academic community and point out open research problems. In particular, we introduce a very flexible layout-level obfuscation tool that we
Georg T. Becker +2 more
openaire +1 more source
Circuit Design Obfuscation for Hardware Security
2018Nowadays, chip design and chip fabrication are normally conducted separately by independent companies. Most integrated circuit (IC) design companies are now adopting a fab-less model: they outsource the chip fabrication to offshore foundries while concentrating their effort and resource on the chip design.
openaire +2 more sources
Hardware assisted control flow obfuscation for embedded processors
Proceedings of the 2004 international conference on Compilers, architecture, and synthesis for embedded systems, 2004With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transaction terminals, pay-TV access-control decoders, where adversaries may easily gain full physical accesses to the systems and critical algorithms must be protected from being ...
Xiaotong Zhuang +3 more
openaire +1 more source
On Obfuscating Programs with Tamper-proof Hardware
2011In recent years, theoretical cryptography community has focused on a fascinating research line of obfuscating programs (circuits). Loosely speaking, obfuscating a program P is to construct a new program which can preserve P's functionality, but its code is fully "unintelligent".
Ning Ding, Dawu Gu
openaire +1 more source

