Results 201 to 210 of about 776,400 (220)
Some of the next articles are maybe not open access.
Hardware Obfuscation of AES through Finite Field Construction Variation
International Symposium on Circuits and Systems, 2019To protect intellectual property, hardware obfuscation is necessary to conceal the implemented function. Besides logic-level approaches, hardware obfuscation can be done through algorithmic modifications.
Xinmiao Zhang +3 more
semanticscholar +1 more source
On Obfuscating Programs with Tamper-proof Hardware
2011In recent years, theoretical cryptography community has focused on a fascinating research line of obfuscating programs (circuits). Loosely speaking, obfuscating a program P is to construct a new program which can preserve P's functionality, but its code is fully "unintelligent".
Ning Ding, Dawu Gu
openaire +1 more source
Defeating Hardware Trojan through Software Obfuscation
2017In recent years a new kind of threat, known as Hard- ware Trojan, is affecting the Integrated Circuit industry. Due to the segmentation in the production, untrusted parties involved in the supply chain may illegally inject additional hardware components, that, under specific circumstances, act for malicious purposes.
MARCELLI, ANDREA +3 more
openaire +1 more source
Hardware Hardening Approaches Using Camouflaging, Encryption, and Obfuscation
2017Due to the trend of globalized semiconductor supply chain, integrated circuits (IC) and hardware intellectual property (IP) are prone to serious security threats such as reverse engineering and IP piracy. In addition to the post-fabrication authentication techniques (e.g., IP metering), various hardware hardening approaches have emerged to resist ...
Qiaoyan Yu +3 more
openaire +1 more source
Hardware Trojan Prevention using Logic Obfuscation
2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS), 2023N Shiny Nishita +5 more
openaire +1 more source
Hardware Protection through Logic Obfuscation
2020Jyotirmoy Pathak, Suman Lata Tripathi
openaire +1 more source
Hardware obfuscation using PUF-based logic
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2014James B. Wendt, Miodrag Potkonjak
openaire +1 more source
Anti-Counterfeit and Anti-Tamper Hardware Implementation using Hardware Obfuscation
2013Tampering and Reverse Engineering of a chip to extract the hardware Intellectual Property (IP) core or to inject malicious alterations is a major concern. First, offshore chip manufacturing allows the design secrets of the IP cores to be transparent to the foundry and other entities along the production chain.
openaire +1 more source

