Results 21 to 30 of about 621 (141)

Security of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption Hardware

open access: yesIEEE Access, 2019
Digital signal processing (DSP) kernel-based intellectual property (IP) core forms an integral ingredient of consumer electronics devices. Thus, protection of these IP cores against reverse engineering attack is crucial.
Anirban Sengupta, Mahendra Rathor
doaj   +1 more source

Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2019
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to protect their designs from the threats posed by the foundries. Few of the threats are IP piracy, counterfeiting and reverse engineering. To overcome these,
V.A. Deepak   +2 more
doaj   +1 more source

Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging Systems

open access: yesIEEE Access, 2020
In modern healthcare technology involving diagnosis through medical imaging systems, compression and data transmission play a pivotal role. Medical imaging systems play an indispensable role in several medical applications where camera/scanners generate ...
Anirban Sengupta, Mahendra Rathor
doaj   +1 more source

Hardware Obfuscation Using High Level Aggregation

open access: yesCOMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES, 2020
The main principle of the proposed techniques is design obfuscation method to achieve hardware security. In the work we consider the reconfigurable-based obfuscation in the post-fabrication stage of IC. We address the need to add reconfigurable-logic stage to the development cycle.
Gorbachov, Valeriy   +3 more
openaire   +3 more sources

Interlocking obfuscation for anti-tamper hardware [PDF]

open access: yesProceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, 2013
Tampering and Reverse Engineering of a chip to extract the hardware Intellectual Property (IP) core or to inject malicious alterations is a major concern. Digital systems susceptible to tampering are of immense concern to defense organizations. First, offshore chip manufacturing allows the design secrets of the IP cores to be transparent to the foundry
Avinash R. Desai   +4 more
openaire   +1 more source

On the Security Goals of White-Box Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
We discuss existing and new security notions for white-box cryptography and comment on their suitability for Digital Rights Management and Mobile Payment Applications, the two prevalent use-cases of white-box cryptography.
Estuardo Alpirez Bock   +3 more
doaj   +1 more source

Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis

open access: yesComputers
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh   +4 more
doaj   +1 more source

Noise‐based logic locking scheme against signal probability skew analysis

open access: yesIET Computers & Digital Techniques, 2021
Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats.
Ahmad Rezaei, Ali Mahani
doaj   +1 more source

Encrypted-State Quantum Compilation Scheme Based on Quantum Circuit Obfuscation for Quantum Cloud Platforms

open access: yesIEEE Transactions on Quantum Engineering
With the rapid advancement of quantum computing, quantum compilation has become a crucial layer connecting high-level algorithms with physical hardware.
Chenyi Zhang   +3 more
doaj   +1 more source

Design of domino logic obfuscation circuit based on dummy contacts

open access: yesDianzi Jishu Yingyong, 2018
Through the study of the logic obfuscation circuit and the physical level camouflage technology, a scheme of the domino logic obfuscation circuit is proposed based on dummy contacts, which can prevent reverse engineering.
Li Liwei, Wang Pengjun, Zhang Yuejun
doaj   +1 more source

Home - About - Disclaimer - Privacy