Results 191 to 200 of about 10,775 (222)
Some of the next articles are maybe not open access.
2018 IEEE 3rd International Verification and Security Workshop (IVSW), 2018
Due to the complexity of digital circuits manufacturing, nowadays most semi-conductor companies outsource part of the fabrication process, reducing both the production costs and the time- to- market. However, as untrusted parties are involved in the production-chain, new security risks arise, and the threat of Hardware Trojans is a serious concern for ...
Andrea Marcelli +3 more
openaire +2 more sources
Due to the complexity of digital circuits manufacturing, nowadays most semi-conductor companies outsource part of the fabrication process, reducing both the production costs and the time- to- market. However, as untrusted parties are involved in the production-chain, new security risks arise, and the threat of Hardware Trojans is a serious concern for ...
Andrea Marcelli +3 more
openaire +2 more sources
A hardware obfuscation technique for manufacturing a secure 3D IC
2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), 20183D Integrated Circuit (3D-IC) is an emerging technology that can address many challenging problems threatening the security of the chip by split manufacturing [1]. One of the disadvantages of split manufacturing is the uncertainty in the reliability of the last foundry that is responsible for the complete bonding of tiers.
Siroos Madani +4 more
openaire +1 more source
Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection
2017The globalized semiconductor supply chain make integrated circuits (ICs) potentially suffer from diverse security threats. Among different hardware attacks, Trojan horse insertion has emerged as a major security concern. To mitigate the hardware Trojan insertion happened in the late stage of IC supply chain, researchers recognize that hardware ...
Qiaoyan Yu +3 more
openaire +1 more source
A Unified Methodology for Hardware Obfuscation and IP Watermarking
2019Hardware security is a matter of increasing importance in the modern world. With increasing threats of piracy and theft, it is needed to devise methodologies to mitigate these concerns. Obfuscating the design netlist is a popular method to achieve this to a significant extent.
Saurabh Gangurde, Binod Kumar 0001
openaire +1 more source
Hardware Protection through Obfuscation
2017This book introduces readers to various threats faced during design and fabrication by todays integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or IC Overproduction, insertion of malicious circuits, referred as Hardware Trojans, which cause in-field chip/system malfunction, and reverse ...
openaire +1 more source
Hardware assisted control flow obfuscation for embedded processors
Proceedings of the 2004 international conference on Compilers, architecture, and synthesis for embedded systems, 2004With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transaction terminals, pay-TV access-control decoders, where adversaries may easily gain full physical accesses to the systems and critical algorithms must be protected from being ...
Xiaotong Zhuang +3 more
openaire +1 more source
Hardware Obfuscation: Techniques and Open Challenges
2017While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation. The main aim of this paper is to start a discussion about hardware obfuscation in the academic community and point out open research problems. In particular, we introduce a very flexible layout-level obfuscation tool that we
Georg T. Becker +2 more
openaire +1 more source
A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware
2011Obfuscating programs is a fascinating area of cryptography. The known general method of obfuscating programs with tamperproof hardware is to first transform a program P to the corresponding ensemble of circuits and then apply the known obfuscation for circuits, e.g. the one by Goyal et al. in TCC'10, to obfuscate some circuit in the ensemble.
Ning Ding 0001, Dawu Gu
openaire +1 more source
Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks
IEEE Transactions on Information Forensics and Security, 2023Likhitha Mankali +2 more
exaly
Hardware Obfuscation for IP Protection of DSP Applications
Journal of Electronic Testing, 2022Naveenkumar R +3 more
openaire +1 more source

