Results 161 to 170 of about 776,400 (220)
Some of the next articles are maybe not open access.
Hardware Obfuscation Using Strong PUFs
2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2018IC piracy is a significant security threat, where malicious manufacturers can produce unauthorized extra chips and/or steal the information of a design through reverse engineering attempts. As a countermeasure, hardware obfuscation schemes usually withhold a part of the design (which thereafter constitutes the "key") by replacing it with configurable ...
Soroush Khaleghi, Wenjing Rao
openaire +2 more sources
HardObfSec: Measuring Hardware Obfuscation Security at RTL
2025 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)1Abstract-In the face of growing threats from Reverse Engineering (RE) attacks, protecting Integrated Circuit (IC) designs has become paramount. Hardware obfuscation stands out as a powerful defense mechanism by deliberately modifying a circuit’s ...
Sonam Sharma +2 more
openaire +2 more sources
Hardware obfuscation for IP protection
2020The horizontal business model adopted by the semiconductor industry has resulted in a manufacturing process that has integrated various foreign entities focusing on individual production steps. However, serious trust issues have emerged with the internationalization of the semiconductor supply chain, and the trust concerns grow further with the ...
A. Alaql +3 more
openaire +2 more sources
Hardware Obfuscation and Logic Locking: A Tutorial Introduction
IEEE Design & Test, 2020Editor’s note : If you are designing or integrating hardware IP blocks into your designs, and you are using common global supply chains, then reading this overview article on how to protect your IP against reverse engineering, piracy, and malicious alteration attacks is a must.
Tamzidul Hoque +2 more
openaire +2 more sources
Exploiting hardware obfuscation methods to prevent and detect hardware Trojans
2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), 2017Due to the globalized semiconductor supply chain, integrated circuits suffer from hardware security attacks. Among various attacks, hardware Trojan insertions have emerged as a major security concern. An adversary modifies the original circuit to accomplish the malicious intentions through the hardware Trojan. Hardware obfuscation has been demonstrated
Qiaoyan Yu, Jaya Dofe, Zhiming Zhang
openaire +2 more sources
Hardware Obfuscation Techniques on FPGA-Based Systems
2020 IEEE East-West Design & Test Symposium (EWDTS), 2020There is a great variety of hardware Trojan detection and prevention approaches. However, state of art approaches cannot provide a full guarantee that an integrated circuit or complex electronic system is free of hardware Trojan. We introduced a reference monitor obfuscation approach on the base of formal transformations of structural system models ...
Valeriy Gorbachov +3 more
openaire +2 more sources
Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection
2017The globalized semiconductor supply chain make integrated circuits (ICs) potentially suffer from diverse security threats. Among different hardware attacks, Trojan horse insertion has emerged as a major security concern. To mitigate the hardware Trojan insertion happened in the late stage of IC supply chain, researchers recognize that hardware ...
Qiaoyan Yu +3 more
openaire +2 more sources
Hardware Obfuscation: Techniques and Open Challenges
2017While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation. The main aim of this paper is to start a discussion about hardware obfuscation in the academic community and point out open research problems. In particular, we introduce a very flexible layout-level obfuscation tool that we
Georg T. Becker +2 more
openaire +2 more sources
Hardware Obfuscation and Logic Locking
Encyclopedia of Cryptography, Security and Privacy, 2021Md Moshiur Rahman, Swarup Bhunia
openaire +2 more sources
Hardware Obfuscation for IP Protection of DSP Applications
Journal of Electronic Testing, 2022Naveenkumar R +3 more
openaire +2 more sources

