Results 11 to 20 of about 621 (141)
Address Obfuscation to Protect against Hardware Trojans in Network-on-Chips
In modern computing, which relies on the interconnection of networks used in many/multi-core systems, any system can be critically subverted if the interconnection is compromised.
Thomas Mountford +5 more
doaj +1 more source
Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression
This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications.
Anirban Sengupta, Rahul Chaurasia
doaj +1 more source
Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification
As the reuse of IP cores or the development of frequently used hardware modules is gaining more attention in the semiconductor industry, the misappropriation of the owner’s identity is a rising concern.
Priyanka Bagul, Vandana Inamdar
doaj +1 more source
On the Difficulty of FSM-based Hardware Obfuscation
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy.
Marc Fyrbiak +6 more
doaj +1 more source
Program Obfuscation with Leaky Hardware [PDF]
We consider general program obfuscation mechanisms using "somewhat trusted" hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifically, our solution has the following properties: (i) The obfuscation remains secure even if all the hardware devices in use are leaky.
Bitansky, Nir +5 more
openaire +3 more sources
In this paper, we propose a new hardware algorithm for an integer based discrete cosine transform (IntDCT) that was designed to allow an efficient VLSI implementation of the discrete cosine transform using the systolic array architectural paradigm.
Doru Florin Chiper, Arcadie Cracan
doaj +1 more source
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead
Opaque predicates are a well-established fundamental building block for software obfuscation. Simplified, an opaque predicate implements an expression that provides constant Boolean output, but appears to have dynamic behavior for static analysis.
Max Hoffmann, Christof Paar
doaj +1 more source
Resource Centric Analysis of RSA and ECC Algorithms on FPGA [PDF]
The electronics industry’s shadow side is counterfeiting, and the doom is growing. Almost every business in the supply chain is impacted by the issue, including component suppliers, distributors, Electronics Manufacturing Services (EMS) providers ...
Sudarshan Deeksha +4 more
doaj +1 more source
From Cryptography to Logic Locking: A Survey on the Architecture Evolution of Secure Scan Chains
The availability of access to Integrated Circuits’ scan chain is an inevitable requirement of modern ICs for testability/debugging purposes. However, leaving access to the scan chain OPEN resulted in numerous security threats on ICs.
Kimia Zamiri Azar +3 more
doaj +1 more source
Hardware Obfuscation of Digital FIR Filters
A finite impulse response (FIR) filter is a ubiquitous block in digital signal processing applications. Its characteristics are determined by its coefficients, which are the intellectual property (IP) for its designer. However, in a hardware efficient realization, its coefficients become vulnerable to reverse engineering.
Aksoy, Levent +3 more
openaire +2 more sources

