Development and Evaluation of Hardware Obfuscation Benchmarks [PDF]
Obfuscation is a promising solution for securing hardware intellectual property (IP) against various attacks, such as reverse engineering, piracy, and tampering. Due to the lack of standard benchmarks, proposed techniques by researchers and practitioners in the community are evaluated by existing benchmark suites such as ISCAS-85, ISCAS-89, and ITC-99.
Sarah Amir +6 more
openaire +2 more sources
Hardware Obfuscation Using High Level Aggregation
The main principle of the proposed techniques is design obfuscation method to achieve hardware security. In the work we consider the reconfigurable-based obfuscation in the post-fabrication stage of IC. We address the need to add reconfigurable-logic stage to the development cycle.
Gorbachov, Valeriy +3 more
openaire +4 more sources
Automated Hardware Logic Obfuscation Framework Using GPT [PDF]
Obfuscation stands as a promising solution for safeguarding hardware intellectual property (IP) against a spectrum of threats including reverse engineering, IP piracy, and tampering. In this paper, we introduce Obfus-chat, a novel framework leveraging Generative Pre-trained Transformer (GPT) models to automate the obfuscation process.
Latibari, Banafsheh Saber +7 more
openaire +3 more sources
Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences [PDF]
Agila Harshini T, Harini Sriraman Department of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, IndiaCorrespondence: Harini Sriraman, Vellore Institute of Technology, Chennai Campus, Vandalur- Kelambakkam Road ...
T AH, Sriraman H
doaj +2 more sources
Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj +3 more sources
A Novel Probability-Based Logic-Locking Technique: ProbLock
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit.
Michael Yue, Sara Tehranipoor
doaj +1 more source
Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency.
Thejaswini P +5 more
doaj +1 more source
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based FPGAs is a persistent problem without a satisfying solution in practice.
Florian Stolz +9 more
doaj +1 more source
Address Obfuscation to Protect against Hardware Trojans in Network-on-Chips
In modern computing, which relies on the interconnection of networks used in many/multi-core systems, any system can be critically subverted if the interconnection is compromised.
Thomas Mountford +5 more
doaj +1 more source
Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression
This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications.
Anirban Sengupta, Rahul Chaurasia
doaj +1 more source

