Results 171 to 180 of about 10,775 (222)

Exploiting hardware obfuscation methods to prevent and detect hardware Trojans

2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), 2017
Due to the globalized semiconductor supply chain, integrated circuits suffer from hardware security attacks. Among various attacks, hardware Trojan insertions have emerged as a major security concern. An adversary modifies the original circuit to accomplish the malicious intentions through the hardware Trojan. Hardware obfuscation has been demonstrated
Qiaoyan Yu
exaly   +2 more sources

Development of a Layout-Level Hardware Obfuscation Tool

2015 IEEE Computer Society Annual Symposium on VLSI, 2015
While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation. The main aim of this paper is to start a discussion about hardware obfuscation in the academic community and point out open research problems. In particular, we introduce a very flexible layout-level obfuscation tool that we
Georg T Becker, Christof Paar
exaly   +2 more sources

A Practical Logic Obfuscation Technique for Hardware Security

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2016
A number of studies of hardware security aim to thwart piracy, overbuilding, and reverse engineering (RE) by obfuscating and/or camouflaging. However, these techniques incur high overheads, and integrated circuit (IC) camouflaging cannot provide any protection for the gate-level netlist of the third party intellectual property (IP) core or the single ...
Jiliang Zhang
exaly   +2 more sources

On the Construction of Composite Finite Fields for Hardware Obfuscation

IEEE Transactions on Computers, 2019
Hardware obfuscation is a technique that modifies the circuit to hide the functionality. Obfuscations through algorithmic modifications add protection in addition to circuit-level techniques, and their effects on the data paths can be analyzed and controlled at the architectural level.
Xinmiao Zhang, Yingjie Lao
exaly   +2 more sources

VLSI Test and Hardware Security Background for Hardware Obfuscation

2017
This chapter discusses the fundamental concepts of design and testing and their role in hardware obfuscation. It outlines the traditional design flow of integrated circuits and assesses the vulnerabilities associated with the verification techniques and testing structures that can expose the design details and help reverse-engineer the functionality. A
Fareena Saqib, Jim Plusquellic
exaly   +2 more sources

Hardware Obfuscation

2019
Swarup Bhunia
exaly   +2 more sources

HOP: Hardware makes Obfuscation Practical

Proceedings 2017 Network and Distributed System Security Symposium, 2017
Program obfuscation is a central primitive in cryptography, and has important real-world applications in protecting software from IP theft. However, well known results from the cryptographic literature have shown that software only virtual black box (VBB) obfuscation of general programs is impossible.
Kartik Nayak   +6 more
openaire   +2 more sources

Hardware Obfuscation Using Strong PUFs

2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2018
IC piracy is a significant security threat, where malicious manufacturers can produce unauthorized extra chips and/or steal the information of a design through reverse engineering attempts. As a countermeasure, hardware obfuscation schemes usually withhold a part of the design (which thereafter constitutes the "key") by replacing it with configurable ...
Soroush Khaleghi, Wenjing Rao
openaire   +1 more source

A Perceptron-Inspired Technique for Hardware Obfuscation

2018 19th International Workshop on Microprocessor and SOC Test and Verification (MTV), 2018
Outsourcing the manufacture of integrated circuits (IC) boosts efficiency in terms of production timeline and minimizing expenditures. However, it results in security challenges, as there is uncertainty in the reliability of the foundry that is responsible for the IC fabrication.
Siroos Madani   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy