Search

Your search keyword '"Hardware obfuscation"' showing total 109 results

Search Constraints

Start Over You searched for: "Hardware obfuscation" Remove constraint "Hardware obfuscation" Language undetermined Remove constraint Language: undetermined
109 results on '"Hardware obfuscation"'

Search Results

1. Preventing DNN Model IP Theft via Hardware Obfuscation

2. Hardware Obfuscation and Logic Locking: A Tutorial Introduction

5. On the Construction of Composite Finite Fields for Hardware Obfuscation

6. Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher

7. Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art

10. Hardware obfuscation for IP protection

11. Development and Evaluation of Hardware Obfuscation Benchmarks

12. Netlist-based Measures for Hardware Obfuscation: A Preliminary Study

13. Hardware Obfuscation Techniques on FPGA-Based Systems

14. Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units

15. Hardware Obfuscation of AES through Finite Field Construction Variation

17. An Orthogonal Algorithm for Key Management in Hardware Obfuscation

21. Enhancing Data Security using Obfuscated 128-bit AES Algorithm - An Active Hardware Obfuscation Approach at RTL Level

22. Hardware Obfuscation Using Strong PUFs

23. A Unified Methodology for Hardware Obfuscation and IP Watermarking

24. A hardware obfuscation technique for manufacturing a secure 3D IC

25. Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection

26. Exploiting hardware obfuscation methods to prevent and detect hardware Trojans

27. On the Difficulty of FSM-based Hardware Obfuscation

28. Comparative Analysis of Hardware Obfuscation for IP Protection

29. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation

30. VLSI Test and Hardware Security Background for Hardware Obfuscation

31. SAT-Attack Resistant Hardware Obfuscation using Camouflaged Two-Dimensional Heterostructure Devices

33. Development of a Layout-Level Hardware Obfuscation Tool

35. Development of a Layout-Level Hardware Obfuscation Tool to Counter Reverse Engineering

37. Anti-Counterfeit and Anti-Tamper Hardware Implementation using Hardware Obfuscation

38. Software and Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation

39. BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person

40. LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection

41. Hybrid Protection of Digital FIR Filters

42. Hardware Security Exploiting Post-CMOS Devices: Fundamental Device Characteristics, State-of-the-Art Countermeasures, Challenges and Roadmap

43. Graph Similarity and its Applications to Hardware Security

44. SOMA: Security Evaluation of Obfuscation Methods via Attack Sequencing

45. Security Assessment of Dynamically Obfuscated Scan Chain Against Oracle-guided Attacks

46. High-Level Synthesis of Key-Obfuscated RTL IP with Design Lockout and Camouflaging

47. Security of Microfluidic Biochip

48. Tunnel FET‐based ultralow‐power and hardware‐secure circuit design considering p‐i‐n forward leakage

49. Top-down Physical Design of Soft Embedded FPGA Fabrics

50. Hardware Redaction via Designer-Directed Fine-Grained eFPGA Insertion

Catalog

Books, media, physical & digital resources