Results 181 to 190 of about 776,400 (220)
Some of the next articles are maybe not open access.

Obfuscation-Resistant Hardware Malware Detection: A Stacked Denoising Autoencoder Approach

IEEE International Symposium on Quality Electronic Design
The increasing reliance on Machine Learning (ML) for malware detection has enhanced security across various computing environments. However, these models remain vulnerable to adversarial manipulations such as code obfuscation, which alters program ...
Zhangying He   +2 more
semanticscholar   +1 more source

Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs

2017
In recent years, hardware obfuscation is one of the prominent anti-tamper solutions that are highly used against various hardware security threats such as piracy, cloning, reverse engineering, chip overbuilding, and hardware Trojans. Logic obfuscation is implemented either in the design description (for soft/firm/hard codes) or structure (for the chip)
Sumathi G.   +4 more
openaire   +1 more source

White-box logic obfuscation: A Transparent Solution to Hardware Piracy and Reverse Engineering

Asia and South Pacific Design Automation Conference
Reverse engineering the functional specification from a netlist is a challenging task that enables IP piracy and tampering. Traditional logic locking techniques, which depend on external activation with secrets stored in tamper-proof locations to thwart ...
Leon Li, A. Orailoglu
semanticscholar   +1 more source

Hardware based Obfuscation for Secure and Trusted Systems: A Comprehensive Study

2025 1st International Conference on Secure IoT, Assured and Trusted Computing (SATC)
Hardware obfuscation techniques aim to protect integrated circuits (ICs) from reverse engineering and intellectual property theft by making their designs harder to understand.
Khaled Saleh   +2 more
semanticscholar   +1 more source

A Pay-Per-ISE RISC-V Processor With Hardware-Assisted Orthogonal Obfuscation

IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Security and cost efficiency are of utmost importance for embedded processors when it comes to limiting hardware resources in IoT applications. This brief presents a security reduced instruction set computer-five (RISC-V) specific instruction set ...
Yuejun Zhang   +6 more
semanticscholar   +1 more source

Q-Learning-Based Obfuscation Finite State Machine for Hardware IP Protection

2025 7th International Conference on Artificial Intelligence Technologies and Applications (ICAITA)
Defense against attack methods such as intellectual property (IP) piracy, overproduction, and reverse engineering in the integrated circuit (IC) supply chain has become a significant research focus.
Fangshuo Dong   +3 more
semanticscholar   +1 more source

Hardware-assisted code obfuscation

2014
Software obfuscation is a longstanding and open research challenge in computer security. While theoretical results indicate that provably secure obfuscation in general is impossible to achieve, many application areas (e.g. malware, commercial software, etc.) show that software obfuscation is indeed employed in practice.
openaire   +1 more source

Built-in Software Obfuscation for Protecting Microprocessors against Hardware Trojan Horses

IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2023
Hardware Trojan Horses (HTHs) are today a serious issue for both academy and industry because of their dramatic complexity and dangerousness. Indeed, it has been shown that HTHs may be effectively inserted in modern microprocessors allowing the attacker ...
A. Palumbo, M. Ottavi, Luca Cassano
semanticscholar   +1 more source

VLSI Test and Hardware Security Background for Hardware Obfuscation

2017
This chapter discusses the fundamental concepts of design and testing and their role in hardware obfuscation. It outlines the traditional design flow of integrated circuits and assesses the vulnerabilities associated with the verification techniques and testing structures that can expose the design details and help reverse-engineer the functionality. A
Fareena Saqib, Jim Plusquellic
openaire   +1 more source

Hardware Protection through Obfuscation

2017
This book introduces readers to various threats faced during design and fabrication by todays integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or IC Overproduction, insertion of malicious circuits, referred as Hardware Trojans, which cause in-field chip/system malfunction, and reverse ...
openaire   +1 more source

Home - About - Disclaimer - Privacy