Results 171 to 180 of about 776,400 (220)
Some of the next articles are maybe not open access.

Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks

IEEE Transactions on Information Forensics and Security, 2023
Hardware obfuscation is a prominent design-for-trust solution that thwarts intellectual property (IP) piracy and reverse-engineering of integrated circuits (ICs).
Likhitha Mankali   +4 more
semanticscholar   +1 more source

Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications

Concurrency and Computation, 2022
In semiconductor industry, reusability‐based System‐on‐Chip architecture using hardware intellectual property (IP) cores play a prominent role in Internet‐of‐Things (IoT) applications for secure data transmission.
Surbhi Chhabra, K. Lata
semanticscholar   +1 more source

Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT

Security and Privacy, 2022
The global market of developing Internet of Things (IoT) devices increases rapidly with improved design goals like cost, energy efficiency, and performance. Unfortunately, the above design goals often come at the expense of security.
Surbhi Chhabra, K. Lata
semanticscholar   +1 more source

Preventing DNN Model IP Theft via Hardware Obfuscation

IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2021
Training accurate deep learning (DL) models require large amounts of training data, significant work in labeling the data, considerable computing resources, and substantial domain expertise. In short, they are expensive to develop.
Brunno F. Goldstein   +5 more
semanticscholar   +1 more source

Split-Fabric: A Novel Wafer-Scale Hardware Obfuscation Methodology using Silicon Interconnect Fabric

Electronic Components and Technology Conference, 2022
Global manufacturing of integrated circuits provides cost-effective access to high-end fabrication facilities. Offshoring intellectual property (IP) to untrusted foundries, however, makes fab-less design houses vulnerable to several issues, such as ...
Yousef Safari   +5 more
semanticscholar   +1 more source

Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art

Iberian Conference on Information Systems and Technologies, 2021
A clear majority of electronic devices applications used in our daily life require a reliable, secure architecture, e.g., healthcare, social security cards, electronic meters, and smart homes.
Husam Kareem, Dmitriy Dunaev
semanticscholar   +1 more source

Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher

2021 28th International Conference on Mixed Design of Integrated Circuits and System, 2021
At different stages of the Integrated Circuit (IC) lifecycle there are attacks which threaten to compromise the integrity of the design through piracy, reverse engineering, hardware Trojan insertion, side channel analysis, and other physical attacks ...
Jason Blocklove   +4 more
semanticscholar   +1 more source

HOP: Hardware makes Obfuscation Practical

Proceedings 2017 Network and Distributed System Security Symposium, 2017
Program obfuscation is a central primitive in cryptography, and has important real-world applications in protecting software from IP theft. However, well known results from the cryptographic literature have shown that software only virtual black box (VBB) obfuscation of general programs is impossible.
Kartik Nayak   +6 more
openaire   +1 more source

Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators

2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2019
Existing logic obfuscation approaches aim to protect hardware design IPs from SAT attack by increasing query count and output corruptibility of a locked netlist. In this paper, we demonstrate the ineffectiveness of such techniques to obfuscate hardware accelerator platforms.
Abhishek Chakraborty, Ankur Srivastava
openaire   +1 more source

Protecting the Intellectual Property of Binary Deep Neural Networks With Efficient Spintronic-Based Hardware Obfuscation

IEEE Transactions on Circuits and Systems Part 1: Regular Papers
Well-trained deep neural network (DNN) models are considered valuable assets because they require large amounts of data, expertise, and resources to achieve desired performance.
Alireza Mohseni   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy