Results 11 to 20 of about 10,775 (222)

Hardware Obfuscation of Digital FIR Filters

open access: yes2022 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), 2022
A finite impulse response (FIR) filter is a ubiquitous block in digital signal processing applications. Its characteristics are determined by its coefficients, which are the intellectual property (IP) for its designer. However, in a hardware efficient realization, its coefficients become vulnerable to reverse engineering.
Levent Aksoy   +3 more
openaire   +2 more sources

Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques

open access: yesEmitter: International Journal of Engineering Technology, 2022
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency.
Thejaswini P   +5 more
doaj   +1 more source

LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based FPGAs is a persistent problem without a satisfying solution in practice.
Florian Stolz   +9 more
doaj   +1 more source

Interlocking obfuscation for anti-tamper hardware [PDF]

open access: yesProceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, 2013
Tampering and Reverse Engineering of a chip to extract the hardware Intellectual Property (IP) core or to inject malicious alterations is a major concern. Digital systems susceptible to tampering are of immense concern to defense organizations. First, offshore chip manufacturing allows the design secrets of the IP cores to be transparent to the foundry
Avinash R. Desai   +4 more
openaire   +1 more source

Address Obfuscation to Protect against Hardware Trojans in Network-on-Chips

open access: yesJournal of Low Power Electronics and Applications, 2023
In modern computing, which relies on the interconnection of networks used in many/multi-core systems, any system can be critically subverted if the interconnection is compromised.
Thomas Mountford   +5 more
doaj   +1 more source

Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression

open access: yesIEEE Access, 2022
This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications.
Anirban Sengupta, Rahul Chaurasia
doaj   +1 more source

Program Obfuscation with Leaky Hardware [PDF]

open access: yes, 2011
We consider general program obfuscation mechanisms using "somewhat trusted" hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifically, our solution has the following properties: (i) The obfuscation remains secure even if all the hardware devices in use are leaky.
Bitansky, Nir   +5 more
openaire   +4 more sources

Development and Evaluation of Hardware Obfuscation Benchmarks [PDF]

open access: yesJournal of Hardware and Systems Security, 2018
Obfuscation is a promising solution for securing hardware intellectual property (IP) against various attacks, such as reverse engineering, piracy, and tampering. Due to the lack of standard benchmarks, proposed techniques by researchers and practitioners in the community are evaluated by existing benchmark suites such as ISCAS-85, ISCAS-89, and ITC-99.
Sarah Amir   +6 more
openaire   +1 more source

Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification

open access: yesInternational Journal of Reconfigurable Computing, 2023
As the reuse of IP cores or the development of frequently used hardware modules is gaining more attention in the semiconductor industry, the misappropriation of the owner’s identity is a rising concern.
Priyanka Bagul, Vandana Inamdar
doaj   +1 more source

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Opaque predicates are a well-established fundamental building block for software obfuscation. Simplified, an opaque predicate implements an expression that provides constant Boolean output, but appears to have dynamic behavior for static analysis.
Max Hoffmann, Christof Paar
doaj   +1 more source

Home - About - Disclaimer - Privacy