Results 191 to 200 of about 10,775 (222)
Some of the next articles are maybe not open access.

On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator

2018 IEEE 3rd International Verification and Security Workshop (IVSW), 2018
Due to the complexity of digital circuits manufacturing, nowadays most semi-conductor companies outsource part of the fabrication process, reducing both the production costs and the time- to- market. However, as untrusted parties are involved in the production-chain, new security risks arise, and the threat of Hardware Trojans is a serious concern for ...
Andrea Marcelli   +3 more
openaire   +2 more sources

A hardware obfuscation technique for manufacturing a secure 3D IC

2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), 2018
3D Integrated Circuit (3D-IC) is an emerging technology that can address many challenging problems threatening the security of the chip by split manufacturing [1]. One of the disadvantages of split manufacturing is the uncertainty in the reliability of the last foundry that is responsible for the complete bonding of tiers.
Siroos Madani   +4 more
openaire   +1 more source

Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection

2017
The globalized semiconductor supply chain make integrated circuits (ICs) potentially suffer from diverse security threats. Among different hardware attacks, Trojan horse insertion has emerged as a major security concern. To mitigate the hardware Trojan insertion happened in the late stage of IC supply chain, researchers recognize that hardware ...
Qiaoyan Yu   +3 more
openaire   +1 more source

A Unified Methodology for Hardware Obfuscation and IP Watermarking

2019
Hardware security is a matter of increasing importance in the modern world. With increasing threats of piracy and theft, it is needed to devise methodologies to mitigate these concerns. Obfuscating the design netlist is a popular method to achieve this to a significant extent.
Saurabh Gangurde, Binod Kumar 0001
openaire   +1 more source

Hardware Protection through Obfuscation

2017
This book introduces readers to various threats faced during design and fabrication by todays integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or IC Overproduction, insertion of malicious circuits, referred as Hardware Trojans, which cause in-field chip/system malfunction, and reverse ...
openaire   +1 more source

Hardware assisted control flow obfuscation for embedded processors

Proceedings of the 2004 international conference on Compilers, architecture, and synthesis for embedded systems, 2004
With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transaction terminals, pay-TV access-control decoders, where adversaries may easily gain full physical accesses to the systems and critical algorithms must be protected from being ...
Xiaotong Zhuang   +3 more
openaire   +1 more source

Hardware Obfuscation: Techniques and Open Challenges

2017
While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation. The main aim of this paper is to start a discussion about hardware obfuscation in the academic community and point out open research problems. In particular, we introduce a very flexible layout-level obfuscation tool that we
Georg T. Becker   +2 more
openaire   +1 more source

A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware

2011
Obfuscating programs is a fascinating area of cryptography. The known general method of obfuscating programs with tamperproof hardware is to first transform a program P to the corresponding ensemble of circuits and then apply the known obfuscation for circuits, e.g. the one by Goyal et al. in TCC'10, to obfuscate some circuit in the ensemble.
Ning Ding 0001, Dawu Gu
openaire   +1 more source

Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks

IEEE Transactions on Information Forensics and Security, 2023
Likhitha Mankali   +2 more
exaly  

Hardware Obfuscation for IP Protection of DSP Applications

Journal of Electronic Testing, 2022
Naveenkumar R   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy