Search

Your search keyword '"Hardware obfuscation"' showing total 18 results

Search Constraints

Start Over You searched for: "Hardware obfuscation" Remove constraint "Hardware obfuscation" Publisher association for computing machinery Remove constraint Publisher: association for computing machinery
18 results on '"Hardware obfuscation"'

Search Results

1. An Overview of FPGA-inspired Obfuscation Techniques.

3. ObNoCs: Protecting Network-on-Chip Fabrics Against Reverse-Engineering Attacks.

5. EVHA: Explainable Vision System for Hardware Testing and Assurance—An Overview.

6. AdaTest: Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection.

7. Using Pattern of On-Off Routers and Links and Router Delays to Protect Network-on-Chip Intellectual Property.

8. Protecting Network-on-Chip Intellectual Property Using Timing Channel Fingerprinting.

9. NN-Lock: A Lightweight Authorization to Prevent IP Threats of Deep Learning Models.

10. Fortifying Vehicular Security through Low Overhead Physically Unclonable Functions.

11. Robust and Attack Resilient Logic Locking with a High Application-Level Impact.

12. Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach.

13. Network-on-Chip Intellectual Property Protection Using Circular Path--based Fingerprinting.

14. A Cellular Automata Guided Obfuscation Strategy For Finite-State-Machine Synthesis.

17. Circuit Camouflage Integration for Hardware IP Protection.

Catalog

Books, media, physical & digital resources