Results 161 to 170 of about 776,400 (220)
Some of the next articles are maybe not open access.

Hardware Obfuscation Using Strong PUFs

2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2018
IC piracy is a significant security threat, where malicious manufacturers can produce unauthorized extra chips and/or steal the information of a design through reverse engineering attempts. As a countermeasure, hardware obfuscation schemes usually withhold a part of the design (which thereafter constitutes the "key") by replacing it with configurable ...
Soroush Khaleghi, Wenjing Rao
openaire   +2 more sources

HardObfSec: Measuring Hardware Obfuscation Security at RTL

2025 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
1Abstract-In the face of growing threats from Reverse Engineering (RE) attacks, protecting Integrated Circuit (IC) designs has become paramount. Hardware obfuscation stands out as a powerful defense mechanism by deliberately modifying a circuit’s ...
Sonam Sharma   +2 more
openaire   +2 more sources

Hardware obfuscation for IP protection

2020
The horizontal business model adopted by the semiconductor industry has resulted in a manufacturing process that has integrated various foreign entities focusing on individual production steps. However, serious trust issues have emerged with the internationalization of the semiconductor supply chain, and the trust concerns grow further with the ...
A. Alaql   +3 more
openaire   +2 more sources

Hardware Obfuscation and Logic Locking: A Tutorial Introduction

IEEE Design & Test, 2020
Editor’s note : If you are designing or integrating hardware IP blocks into your designs, and you are using common global supply chains, then reading this overview article on how to protect your IP against reverse engineering, piracy, and malicious alteration attacks is a must.
Tamzidul Hoque   +2 more
openaire   +2 more sources

Exploiting hardware obfuscation methods to prevent and detect hardware Trojans

2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), 2017
Due to the globalized semiconductor supply chain, integrated circuits suffer from hardware security attacks. Among various attacks, hardware Trojan insertions have emerged as a major security concern. An adversary modifies the original circuit to accomplish the malicious intentions through the hardware Trojan. Hardware obfuscation has been demonstrated
Qiaoyan Yu, Jaya Dofe, Zhiming Zhang
openaire   +2 more sources

Hardware Obfuscation Techniques on FPGA-Based Systems

2020 IEEE East-West Design & Test Symposium (EWDTS), 2020
There is a great variety of hardware Trojan detection and prevention approaches. However, state of art approaches cannot provide a full guarantee that an integrated circuit or complex electronic system is free of hardware Trojan. We introduced a reference monitor obfuscation approach on the base of formal transformations of structural system models ...
Valeriy Gorbachov   +3 more
openaire   +2 more sources

Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection

2017
The globalized semiconductor supply chain make integrated circuits (ICs) potentially suffer from diverse security threats. Among different hardware attacks, Trojan horse insertion has emerged as a major security concern. To mitigate the hardware Trojan insertion happened in the late stage of IC supply chain, researchers recognize that hardware ...
Qiaoyan Yu   +3 more
openaire   +2 more sources

Hardware Obfuscation: Techniques and Open Challenges

2017
While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation. The main aim of this paper is to start a discussion about hardware obfuscation in the academic community and point out open research problems. In particular, we introduce a very flexible layout-level obfuscation tool that we
Georg T. Becker   +2 more
openaire   +2 more sources

Hardware Obfuscation and Logic Locking

Encyclopedia of Cryptography, Security and Privacy, 2021
Md Moshiur Rahman, Swarup Bhunia
openaire   +2 more sources

Hardware Obfuscation for IP Protection of DSP Applications

Journal of Electronic Testing, 2022
Naveenkumar R   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy