Results 181 to 190 of about 10,775 (222)
Some of the next articles are maybe not open access.

Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs

2017
In recent years, hardware obfuscation is one of the prominent anti-tamper solutions that are highly used against various hardware security threats such as piracy, cloning, reverse engineering, chip overbuilding, and hardware Trojans. Logic obfuscation is implemented either in the design description (for soft/firm/hard codes) or structure (for the chip)
G. Sumathi   +4 more
openaire   +1 more source

Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators

2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2019
Existing logic obfuscation approaches aim to protect hardware design IPs from SAT attack by increasing query count and output corruptibility of a locked netlist. In this paper, we demonstrate the ineffectiveness of such techniques to obfuscate hardware accelerator platforms.
Abhishek Chakraborty 0001   +1 more
openaire   +2 more sources

On the optimization of Software Obfuscation against Hardware Trojans in Microprocessors

2022 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), 2022
The quest of low production cost and short time-tomarket, as well as the complexity of modern integrated circuits pushed towards a globalization of the supply chain of silicon devices. Such production paradigm raised a number of security threats among which Hardware Trojan Horses (HTHs), that became a serious issue not only for academy but also for ...
Cassano, L   +3 more
openaire   +1 more source

Hardware Obfuscation and Logic Locking: A Tutorial Introduction

IEEE Design & Test, 2020
Editor’s note : If you are designing or integrating hardware IP blocks into your designs, and you are using common global supply chains, then reading this overview article on how to protect your IP against reverse engineering, piracy, and malicious alteration attacks is a must.
Tamzidul Hoque   +2 more
openaire   +1 more source

On Obfuscating Programs with Tamper-proof Hardware

2011
In recent years, theoretical cryptography community has focused on a fascinating research line of obfuscating programs (circuits). Loosely speaking, obfuscating a program P is to construct a new program which can preserve P's functionality, but its code is fully "unintelligent".
Ning Ding 0001, Dawu Gu
openaire   +1 more source

Hardware Obfuscation Techniques on FPGA-Based Systems

2020 IEEE East-West Design & Test Symposium (EWDTS), 2020
There is a great variety of hardware Trojan detection and prevention approaches. However, state of art approaches cannot provide a full guarantee that an integrated circuit or complex electronic system is free of hardware Trojan. We introduced a reference monitor obfuscation approach on the base of formal transformations of structural system models ...
Valeriy Gorbachov   +3 more
openaire   +1 more source

An Orthogonal Algorithm for Key Management in Hardware Obfuscation

2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 2019
The globalization of supply chain makes semiconductor chips susceptible to various security threats. Design obfuscation techniques have been widely investigated to thwart intellectual property (IP) piracy attacks. Key distribution among IP providers, system integration team, and end users remains as a challenging problem.
Jiawei Wang   +6 more
openaire   +1 more source

Circuit Design Obfuscation for Hardware Security

2018
Nowadays, chip design and chip fabrication are normally conducted separately by independent companies. Most integrated circuit (IC) design companies are now adopting a fab-less model: they outsource the chip fabrication to offshore foundries while concentrating their effort and resource on the chip design.
openaire   +2 more sources

Hardware obfuscation for IP protection

2020
The horizontal business model adopted by the semiconductor industry has resulted in a manufacturing process that has integrated various foreign entities focusing on individual production steps. However, serious trust issues have emerged with the internationalization of the semiconductor supply chain, and the trust concerns grow further with the ...
openaire   +1 more source

Hardware-assisted code obfuscation

2014
Software obfuscation is a longstanding and open research challenge in computer security. While theoretical results indicate that provably secure obfuscation in general is impossible to achieve, many application areas (e.g. malware, commercial software, etc.) show that software obfuscation is indeed employed in practice.
openaire   +1 more source

Home - About - Disclaimer - Privacy