Results 11 to 20 of about 776,400 (220)

Development and Evaluation of Hardware Obfuscation Benchmarks [PDF]

open access: yesJournal of Hardware and Systems Security, 2018
Obfuscation is a promising solution for securing hardware intellectual property (IP) against various attacks, such as reverse engineering, piracy, and tampering. Due to the lack of standard benchmarks, proposed techniques by researchers and practitioners in the community are evaluated by existing benchmark suites such as ISCAS-85, ISCAS-89, and ITC-99.
Sarah Amir   +6 more
openaire   +2 more sources

Hardware Obfuscation Using High Level Aggregation

open access: yesCOMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES, 2020
The main principle of the proposed techniques is design obfuscation method to achieve hardware security. In the work we consider the reconfigurable-based obfuscation in the post-fabrication stage of IC. We address the need to add reconfigurable-logic stage to the development cycle.
Gorbachov, Valeriy   +3 more
openaire   +4 more sources

Automated Hardware Logic Obfuscation Framework Using GPT [PDF]

open access: yes2024 IEEE 17th Dallas Circuits and Systems Conference (DCAS)
Obfuscation stands as a promising solution for safeguarding hardware intellectual property (IP) against a spectrum of threats including reverse engineering, IP piracy, and tampering. In this paper, we introduce Obfus-chat, a novel framework leveraging Generative Pre-trained Transformer (GPT) models to automate the obfuscation process.
Latibari, Banafsheh Saber   +7 more
openaire   +3 more sources

Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences [PDF]

open access: yesJournal of Multidisciplinary Healthcare
Agila Harshini T, Harini Sriraman Department of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, IndiaCorrespondence: Harini Sriraman, Vellore Institute of Technology, Chennai Campus, Vandalur- Kelambakkam Road ...
T AH, Sriraman H
doaj   +2 more sources

Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj   +3 more sources

A Novel Probability-Based Logic-Locking Technique: ProbLock

open access: yesSensors, 2021
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit.
Michael Yue, Sara Tehranipoor
doaj   +1 more source

Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques

open access: yesEmitter: International Journal of Engineering Technology, 2022
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency.
Thejaswini P   +5 more
doaj   +1 more source

LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based FPGAs is a persistent problem without a satisfying solution in practice.
Florian Stolz   +9 more
doaj   +1 more source

Address Obfuscation to Protect against Hardware Trojans in Network-on-Chips

open access: yesJournal of Low Power Electronics and Applications, 2023
In modern computing, which relies on the interconnection of networks used in many/multi-core systems, any system can be critically subverted if the interconnection is compromised.
Thomas Mountford   +5 more
doaj   +1 more source

Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression

open access: yesIEEE Access, 2022
This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications.
Anirban Sengupta, Rahul Chaurasia
doaj   +1 more source

Home - About - Disclaimer - Privacy