Results 121 to 130 of about 621 (141)
Some of the next articles are maybe not open access.

Ephemeral Key-based Hybrid Hardware Obfuscation

2022 19th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 2022
Neelam Nasir   +4 more
openaire   +1 more source

Defeating Hardware Trojan through Software Obfuscation

2017
In recent years a new kind of threat, known as Hard- ware Trojan, is affecting the Integrated Circuit industry. Due to the segmentation in the production, untrusted parties involved in the supply chain may illegally inject additional hardware components, that, under specific circumstances, act for malicious purposes.
MARCELLI, ANDREA   +3 more
openaire   +1 more source

Hardware Hardening Approaches Using Camouflaging, Encryption, and Obfuscation

2017
Due to the trend of globalized semiconductor supply chain, integrated circuits (IC) and hardware intellectual property (IP) are prone to serious security threats such as reverse engineering and IP piracy. In addition to the post-fabrication authentication techniques (e.g., IP metering), various hardware hardening approaches have emerged to resist ...
Qiaoyan Yu   +3 more
openaire   +1 more source

Hardware Obfuscation and Logic Locking

2021
Md Moshiur Rahman, Swarup Bhunia
openaire   +1 more source

Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM

IEEJ Transactions on Industry Applications, 2019
Yuumi Matsuoka   +2 more
openaire   +1 more source

Hardware Trojan Prevention using Logic Obfuscation

2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS), 2023
N Shiny Nishita   +5 more
openaire   +1 more source

Hardware Obfuscation

2019
Swarup Bhunia, Mark Tehranipoor
openaire   +1 more source

Hardware Protection through Logic Obfuscation

2020
Jyotirmoy Pathak, Suman Lata Tripathi
openaire   +1 more source

Hardware obfuscation using PUF-based logic

2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2014
James B. Wendt, Miodrag Potkonjak
openaire   +1 more source

Anti-Counterfeit and Anti-Tamper Hardware Implementation using Hardware Obfuscation

2013
Tampering and Reverse Engineering of a chip to extract the hardware Intellectual Property (IP) core or to inject malicious alterations is a major concern. First, offshore chip manufacturing allows the design secrets of the IP cores to be transparent to the foundry and other entities along the production chain.
openaire   +1 more source

Home - About - Disclaimer - Privacy