Results 191 to 200 of about 776,400 (220)
Some of the next articles are maybe not open access.
On the Construction of Composite Finite Fields for Hardware Obfuscation
IEEE transactions on computers, 2019Hardware obfuscation is a technique that modifies the circuit to hide the functionality. Obfuscations through algorithmic modifications add protection in addition to circuit-level techniques, and their effects on the data paths can be analyzed and ...
Xinmiao Zhang, Yingjie Lao
semanticscholar +1 more source
Netlist-based Measures for Hardware Obfuscation: A Preliminary Study
2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW), 2020It is important to protect the intellectual properties of logic circuits from reverse engineering. One of the countermeasures is logic obfuscation, which complicates the internal structures of logic circuits to prevent reverse engineering.
Shotaro Yamada, S. Ichikawa
semanticscholar +1 more source
A Perceptron-Inspired Technique for Hardware Obfuscation
2018 19th International Workshop on Microprocessor and SOC Test and Verification (MTV), 2018Outsourcing the manufacture of integrated circuits (IC) boosts efficiency in terms of production timeline and minimizing expenditures. However, it results in security challenges, as there is uncertainty in the reliability of the foundry that is responsible for the IC fabrication.
Siroos Madani +2 more
openaire +1 more source
Comparative Analysis of Hardware Obfuscation for IP Protection
ACM Great Lakes Symposium on VLSI, 2017In the era of globalized Integrated Circuit (IC) design and manufacturing flow, a rising issue to the silicon industry is various attacks on hardware intellectual property (IP).
Sarah Amir +4 more
semanticscholar +1 more source
Security Evaluation of State Space Obfuscation of Hardware IP through a Red Team-Blue Team Practice
ACM Trans. Design Autom. Electr. Syst.Due to the inclination towards a fab-less model of integrated circuit (IC) manufacturing, several untrusted entities get white-box access to the proprietary intellectual property (IP) blocks from diverse vendors.
Md. Moshiur Rahman +7 more
semanticscholar +1 more source
International Conference on Advances in Computing, Communications and Informatics, 2018
Nowadays, integrated circuits (ICs) security grown as a primary responsibility at every stage of IC supply chain due to the globalized design, fabrication, test, deployment and monitoring of an IC.
Surbhi Chhabra, K. Lata
semanticscholar +1 more source
Nowadays, integrated circuits (ICs) security grown as a primary responsibility at every stage of IC supply chain due to the globalized design, fabrication, test, deployment and monitoring of an IC.
Surbhi Chhabra, K. Lata
semanticscholar +1 more source
DyFORA: Dynamic Firmware Obfuscation and Remote Attestation using Hardware Signatures
ACM Great Lakes Symposium on VLSIIn an era dominated by embedded devices, securing firmware is critical. These devices, often in limited-resource settings, are targets for attacks like piracy, tampering, and reverse engineering.
Sajeed Mohammad, Farimah Farahmandi
semanticscholar +1 more source
Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units
International Symposium on Circuits and Systems, 2019Intellectual property (IP) piracy and electronic counterfeiting have emerged as critical threats to the semiconductor industry in the current horizontal business model where the supply chain usually involves a large number of vendors.
Ankur A Sharma +2 more
semanticscholar +1 more source
Circuit Design Obfuscation for Hardware Security
2018Nowadays, chip design and chip fabrication are normally conducted separately by independent companies. Most integrated circuit (IC) design companies are now adopting a fab-less model: they outsource the chip fabrication to offshore foundries while concentrating their effort and resource on the chip design.
openaire +2 more sources
Hardware assisted control flow obfuscation for embedded processors
Proceedings of the 2004 international conference on Compilers, architecture, and synthesis for embedded systems, 2004With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transaction terminals, pay-TV access-control decoders, where adversaries may easily gain full physical accesses to the systems and critical algorithms must be protected from being ...
Xiaotong Zhuang +3 more
openaire +1 more source

