Results 201 to 210 of about 776,400 (220)
Some of the next articles are maybe not open access.

Hardware Obfuscation of AES through Finite Field Construction Variation

International Symposium on Circuits and Systems, 2019
To protect intellectual property, hardware obfuscation is necessary to conceal the implemented function. Besides logic-level approaches, hardware obfuscation can be done through algorithmic modifications.
Xinmiao Zhang   +3 more
semanticscholar   +1 more source

On Obfuscating Programs with Tamper-proof Hardware

2011
In recent years, theoretical cryptography community has focused on a fascinating research line of obfuscating programs (circuits). Loosely speaking, obfuscating a program P is to construct a new program which can preserve P's functionality, but its code is fully "unintelligent".
Ning Ding, Dawu Gu
openaire   +1 more source

Defeating Hardware Trojan through Software Obfuscation

2017
In recent years a new kind of threat, known as Hard- ware Trojan, is affecting the Integrated Circuit industry. Due to the segmentation in the production, untrusted parties involved in the supply chain may illegally inject additional hardware components, that, under specific circumstances, act for malicious purposes.
MARCELLI, ANDREA   +3 more
openaire   +1 more source

Hardware Hardening Approaches Using Camouflaging, Encryption, and Obfuscation

2017
Due to the trend of globalized semiconductor supply chain, integrated circuits (IC) and hardware intellectual property (IP) are prone to serious security threats such as reverse engineering and IP piracy. In addition to the post-fabrication authentication techniques (e.g., IP metering), various hardware hardening approaches have emerged to resist ...
Qiaoyan Yu   +3 more
openaire   +1 more source

Hardware Trojan Prevention using Logic Obfuscation

2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS), 2023
N Shiny Nishita   +5 more
openaire   +1 more source

Hardware Obfuscation

2019
Swarup Bhunia, Mark Tehranipoor
openaire   +1 more source

Hardware Protection through Logic Obfuscation

2020
Jyotirmoy Pathak, Suman Lata Tripathi
openaire   +1 more source

Hardware obfuscation using PUF-based logic

2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2014
James B. Wendt, Miodrag Potkonjak
openaire   +1 more source

Anti-Counterfeit and Anti-Tamper Hardware Implementation using Hardware Obfuscation

2013
Tampering and Reverse Engineering of a chip to extract the hardware Intellectual Property (IP) core or to inject malicious alterations is a major concern. First, offshore chip manufacturing allows the design secrets of the IP cores to be transparent to the foundry and other entities along the production chain.
openaire   +1 more source

Home - About - Disclaimer - Privacy