Results 21 to 30 of about 621 (141)
Digital signal processing (DSP) kernel-based intellectual property (IP) core forms an integral ingredient of consumer electronics devices. Thus, protection of these IP cores against reverse engineering attack is crucial.
Anirban Sengupta, Mahendra Rathor
doaj +1 more source
Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques [PDF]
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to protect their designs from the threats posed by the foundries. Few of the threats are IP piracy, counterfeiting and reverse engineering. To overcome these,
V.A. Deepak +2 more
doaj +1 more source
In modern healthcare technology involving diagnosis through medical imaging systems, compression and data transmission play a pivotal role. Medical imaging systems play an indispensable role in several medical applications where camera/scanners generate ...
Anirban Sengupta, Mahendra Rathor
doaj +1 more source
Hardware Obfuscation Using High Level Aggregation
The main principle of the proposed techniques is design obfuscation method to achieve hardware security. In the work we consider the reconfigurable-based obfuscation in the post-fabrication stage of IC. We address the need to add reconfigurable-logic stage to the development cycle.
Gorbachov, Valeriy +3 more
openaire +3 more sources
Interlocking obfuscation for anti-tamper hardware [PDF]
Tampering and Reverse Engineering of a chip to extract the hardware Intellectual Property (IP) core or to inject malicious alterations is a major concern. Digital systems susceptible to tampering are of immense concern to defense organizations. First, offshore chip manufacturing allows the design secrets of the IP cores to be transparent to the foundry
Avinash R. Desai +4 more
openaire +1 more source
On the Security Goals of White-Box Cryptography
We discuss existing and new security notions for white-box cryptography and comment on their suitability for Digital Rights Management and Mobile Payment Applications, the two prevalent use-cases of white-box cryptography.
Estuardo Alpirez Bock +3 more
doaj +1 more source
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh +4 more
doaj +1 more source
Noise‐based logic locking scheme against signal probability skew analysis
Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats.
Ahmad Rezaei, Ali Mahani
doaj +1 more source
With the rapid advancement of quantum computing, quantum compilation has become a crucial layer connecting high-level algorithms with physical hardware.
Chenyi Zhang +3 more
doaj +1 more source
Design of domino logic obfuscation circuit based on dummy contacts
Through the study of the logic obfuscation circuit and the physical level camouflage technology, a scheme of the domino logic obfuscation circuit is proposed based on dummy contacts, which can prevent reverse engineering.
Li Liwei, Wang Pengjun, Zhang Yuejun
doaj +1 more source

