Search

Your search keyword '"Hardware obfuscation"' showing total 46 results

Search Constraints

Start Over You searched for: "Hardware obfuscation" Remove constraint "Hardware obfuscation" Topic computer Remove constraint Topic: computer Language undetermined Remove constraint Language: undetermined
46 results on '"Hardware obfuscation"'

Search Results

1. Hardware Obfuscation and Logic Locking: A Tutorial Introduction

2. Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher

3. Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art

4. Hardware obfuscation for IP protection

5. Development and Evaluation of Hardware Obfuscation Benchmarks

6. Netlist-based Measures for Hardware Obfuscation: A Preliminary Study

7. Hardware Obfuscation Using Strong PUFs

8. A Unified Methodology for Hardware Obfuscation and IP Watermarking

9. Exploiting hardware obfuscation methods to prevent and detect hardware Trojans

10. Comparative Analysis of Hardware Obfuscation for IP Protection

11. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation

12. VLSI Test and Hardware Security Background for Hardware Obfuscation

13. Development of a Layout-Level Hardware Obfuscation Tool

14. BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person

15. LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection

16. SOMA: Security Evaluation of Obfuscation Methods via Attack Sequencing

17. High-Level Synthesis of Key-Obfuscated RTL IP with Design Lockout and Camouflaging

18. Security of Microfluidic Biochip

19. Mystic: Mystifying IP Cores Using an Always-ON FSM Obfuscation Method

20. Security Vulnerabilities in Applying Decentralized Ledger Systems for Obfuscating Hardwares

21. Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection

22. Security Assessment of High-Level Synthesis

23. Threats on Logic Locking: A Decade Later

24. A Low Cost MST-FSM Obfuscation Method for Hardware IP Protection

25. Securing Computer Hardware on the Base of Reference Monitor Obfuscation

26. Hardware Security-present and Future Trends

27. On Custom LUT-based Obfuscation

28. Hardware Protection through Obfuscation

29. Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack

30. A Practical Logic Obfuscation Technique for Hardware Security

31. A Novel PUF based Logic Encryption Technique to Prevent SAT Attacks and Trojan Insertion

32. Solving the Third-Shift Problem in IC Piracy With Test-Aware Logic Locking

33. Permutation-Based Obfuscation

34. AppSAT: Approximately deobfuscating integrated circuits

35. A Primer on Hardware Security: Models, Methods, and Metrics

36. Obfuscation-Based Secure SoC Design for Protection Against Piracy and Trojan Attacks

37. On meta-obfuscation of physical layouts to conceal design characteristics

38. SARLock: SAT attack resistant logic locking

39. Ending Piracy of Integrated Circuits

40. Preventing IC Piracy Using Reconfigurable Logic Barriers

41. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection

42. A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans

43. Security analysis of logic obfuscation

44. Security against hardware Trojan through a novel application of design obfuscation

45. EPIC

46. Hardware metering

Catalog

Books, media, physical & digital resources