Search

Your search keyword '"Hardware obfuscation"' showing total 188 results

Search Constraints

Start Over You searched for: "Hardware obfuscation" Remove constraint "Hardware obfuscation" Search Limiters Full Text Remove constraint Search Limiters: Full Text
188 results on '"Hardware obfuscation"'

Search Results

2. Hardware Obfuscation of Digital FIR Filters

3. ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

4. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation

5. Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification

6. On the Difficulty of FSM-based Hardware Obfuscation

7. Protecting the Intellectual Property of Binary Deep Neural Networks With Efficient Spintronic-Based Hardware Obfuscation

8. On the Construction of Composite Finite Fields for Hardware Obfuscation

11. Development and Evaluation of Hardware Obfuscation Benchmarks

12. Key Generation for Hardware Obfuscation Using Strong PUFs

13. Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification.

14. Hardware Obfuscation of Digital FIR Filters

15. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation

16. On the Construction of Composite Finite Fields for Hardware Obfuscation.

17. Comparative Analysis of Hardware Obfuscation for IP Protection

18. SAT-Attack Resistant Hardware Obfuscation using Camouflaged Two-Dimensional Heterostructure Devices

19. Reports on Reverse Engineering from LNM Institute of Information Technology Provide New Insights (Hardware Obfuscation of Aes Ip Core Using Combinational Hardware Trojan Circuit for Secure Data Transmission In Iot Applications)

20. Anti-Counterfeit and Anti-Tamper Hardware Implementation using Hardware Obfuscation

22. Software and Critical Technology Protection Against Side-Channel Analysis Through Dynamic Hardware Obfuscation

24. New Data from Ohio State University Illuminate Findings in Computers (On the Construction of Composite Finite Fields for Hardware Obfuscation)

25. Software and Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation

26. LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security

27. A Novel Probability-Based Logic-Locking Technique: ProbLock

29. Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

30. LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection

31. A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking

32. Hybrid Protection of Digital FIR Filters

33. Graph Similarity and its Applications to Hardware Security

34. High-level Intellectual Property Obfuscation via Decoy Constants

35. Security of Microfluidic Biochip

36. Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design

37. Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

38. Novel Dynamic State-Deflection Method for Gate-Level Design Obfuscation

39. A Low Cost MST-FSM Obfuscation Method for Hardware IP Protection.

40. IP protection through gate-level netlist security enhancement

41. Survey of Security Issues in Memristor-Based Machine Learning Accelerators for RF Analysis.

42. UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking

43. Threats on Logic Locking: A Decade Later

44. A Low Cost MST-FSM Obfuscation Method for Hardware IP Protection

45. A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking.

46. Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack

47. On Improving the Security of Logic Locking

48. Solving the Third-Shift Problem in IC Piracy With Test-Aware Logic Locking

49. Fault Analysis-Based Logic Encryption

50. Hybrid Obfuscation to Protect against Disclosure Attacks on Embedded Microprocessors

Catalog

Books, media, physical & digital resources