1. Hardware Obfuscation and Logic Locking: A Tutorial Introduction
- Author
-
Tamzidul Hoque, Rajat Subhra Chakraborty, and Swarup Bhunia
- Subjects
Reverse engineering ,Focus (computing) ,Sequential logic ,Computer science ,business.industry ,Supply chain ,Reading (computer) ,02 engineering and technology ,Integrated circuit ,computer.software_genre ,020202 computer hardware & architecture ,law.invention ,Hardware and Architecture ,law ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Hardware obfuscation ,Electrical and Electronic Engineering ,business ,computer ,Software ,AND gate - Abstract
Editor’s note : If you are designing or integrating hardware IP blocks into your designs, and you are using common global supply chains, then reading this overview article on how to protect your IP against reverse engineering, piracy, and malicious alteration attacks is a must. The authors give a comprehensive overview of current countermeasures that can be used at RTL, gate-, and layout-level to protect your design with a focus on combinational and sequential logic locking and a discussion on merits, overheads, and shortcomings of such techniques. —Jurgen Teich, FAU Erlangen
- Published
- 2020
- Full Text
- View/download PDF