Results 11 to 20 of about 621 (141)

Address Obfuscation to Protect against Hardware Trojans in Network-on-Chips

open access: yesJournal of Low Power Electronics and Applications, 2023
In modern computing, which relies on the interconnection of networks used in many/multi-core systems, any system can be critically subverted if the interconnection is compromised.
Thomas Mountford   +5 more
doaj   +1 more source

Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression

open access: yesIEEE Access, 2022
This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications.
Anirban Sengupta, Rahul Chaurasia
doaj   +1 more source

Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification

open access: yesInternational Journal of Reconfigurable Computing, 2023
As the reuse of IP cores or the development of frequently used hardware modules is gaining more attention in the semiconductor industry, the misappropriation of the owner’s identity is a rising concern.
Priyanka Bagul, Vandana Inamdar
doaj   +1 more source

On the Difficulty of FSM-based Hardware Obfuscation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy.
Marc Fyrbiak   +6 more
doaj   +1 more source

Program Obfuscation with Leaky Hardware [PDF]

open access: yes, 2011
We consider general program obfuscation mechanisms using "somewhat trusted" hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifically, our solution has the following properties: (i) The obfuscation remains secure even if all the hardware devices in use are leaky.
Bitansky, Nir   +5 more
openaire   +3 more sources

An Efficient Algorithm and Architecture for the VLSI Implementation of Integer DCT That Allows an Efficient Incorporation of the Hardware Security with a Low Overhead

open access: yesApplied Sciences, 2023
In this paper, we propose a new hardware algorithm for an integer based discrete cosine transform (IntDCT) that was designed to allow an efficient VLSI implementation of the discrete cosine transform using the systolic array architectural paradigm.
Doru Florin Chiper, Arcadie Cracan
doaj   +1 more source

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Opaque predicates are a well-established fundamental building block for software obfuscation. Simplified, an opaque predicate implements an expression that provides constant Boolean output, but appears to have dynamic behavior for static analysis.
Max Hoffmann, Christof Paar
doaj   +1 more source

Resource Centric Analysis of RSA and ECC Algorithms on FPGA [PDF]

open access: yesITM Web of Conferences, 2023
The electronics industry’s shadow side is counterfeiting, and the doom is growing. Almost every business in the supply chain is impacted by the issue, including component suppliers, distributors, Electronics Manufacturing Services (EMS) providers ...
Sudarshan Deeksha   +4 more
doaj   +1 more source

From Cryptography to Logic Locking: A Survey on the Architecture Evolution of Secure Scan Chains

open access: yesIEEE Access, 2021
The availability of access to Integrated Circuits’ scan chain is an inevitable requirement of modern ICs for testability/debugging purposes. However, leaving access to the scan chain OPEN resulted in numerous security threats on ICs.
Kimia Zamiri Azar   +3 more
doaj   +1 more source

Hardware Obfuscation of Digital FIR Filters

open access: yes2022 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), 2022
A finite impulse response (FIR) filter is a ubiquitous block in digital signal processing applications. Its characteristics are determined by its coefficients, which are the intellectual property (IP) for its designer. However, in a hardware efficient realization, its coefficients become vulnerable to reverse engineering.
Aksoy, Levent   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy