Results 171 to 180 of about 10,775 (222)
Evaluation of IoT based smart safety systems for women and children using machine learning techniques. [PDF]
Wagh NR +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Exploiting hardware obfuscation methods to prevent and detect hardware Trojans
2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), 2017Due to the globalized semiconductor supply chain, integrated circuits suffer from hardware security attacks. Among various attacks, hardware Trojan insertions have emerged as a major security concern. An adversary modifies the original circuit to accomplish the malicious intentions through the hardware Trojan. Hardware obfuscation has been demonstrated
Qiaoyan Yu
exaly +2 more sources
Development of a Layout-Level Hardware Obfuscation Tool
2015 IEEE Computer Society Annual Symposium on VLSI, 2015While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation. The main aim of this paper is to start a discussion about hardware obfuscation in the academic community and point out open research problems. In particular, we introduce a very flexible layout-level obfuscation tool that we
Georg T Becker, Christof Paar
exaly +2 more sources
A Practical Logic Obfuscation Technique for Hardware Security
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2016A number of studies of hardware security aim to thwart piracy, overbuilding, and reverse engineering (RE) by obfuscating and/or camouflaging. However, these techniques incur high overheads, and integrated circuit (IC) camouflaging cannot provide any protection for the gate-level netlist of the third party intellectual property (IP) core or the single ...
Jiliang Zhang
exaly +2 more sources
On the Construction of Composite Finite Fields for Hardware Obfuscation
IEEE Transactions on Computers, 2019Hardware obfuscation is a technique that modifies the circuit to hide the functionality. Obfuscations through algorithmic modifications add protection in addition to circuit-level techniques, and their effects on the data paths can be analyzed and controlled at the architectural level.
Xinmiao Zhang, Yingjie Lao
exaly +2 more sources
VLSI Test and Hardware Security Background for Hardware Obfuscation
2017This chapter discusses the fundamental concepts of design and testing and their role in hardware obfuscation. It outlines the traditional design flow of integrated circuits and assesses the vulnerabilities associated with the verification techniques and testing structures that can expose the design details and help reverse-engineer the functionality. A
Fareena Saqib, Jim Plusquellic
exaly +2 more sources
HOP: Hardware makes Obfuscation Practical
Proceedings 2017 Network and Distributed System Security Symposium, 2017Program obfuscation is a central primitive in cryptography, and has important real-world applications in protecting software from IP theft. However, well known results from the cryptographic literature have shown that software only virtual black box (VBB) obfuscation of general programs is impossible.
Kartik Nayak +6 more
openaire +2 more sources
Hardware Obfuscation Using Strong PUFs
2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2018IC piracy is a significant security threat, where malicious manufacturers can produce unauthorized extra chips and/or steal the information of a design through reverse engineering attempts. As a countermeasure, hardware obfuscation schemes usually withhold a part of the design (which thereafter constitutes the "key") by replacing it with configurable ...
Soroush Khaleghi, Wenjing Rao
openaire +1 more source
A Perceptron-Inspired Technique for Hardware Obfuscation
2018 19th International Workshop on Microprocessor and SOC Test and Verification (MTV), 2018Outsourcing the manufacture of integrated circuits (IC) boosts efficiency in terms of production timeline and minimizing expenditures. However, it results in security challenges, as there is uncertainty in the reliability of the foundry that is responsible for the IC fabrication.
Siroos Madani +2 more
openaire +1 more source

