Search

Your search keyword '"Hardware obfuscation"' showing total 52 results

Search Constraints

Start Over You searched for: "Hardware obfuscation" Remove constraint "Hardware obfuscation" Topic 02 engineering and technology Remove constraint Topic: 02 engineering and technology
52 results on '"Hardware obfuscation"'

Search Results

1. Hardware Obfuscation and Logic Locking: A Tutorial Introduction

2. On the Construction of Composite Finite Fields for Hardware Obfuscation

3. Development and Evaluation of Hardware Obfuscation Benchmarks

4. Netlist-based Measures for Hardware Obfuscation: A Preliminary Study

5. Hardware Obfuscation Techniques on FPGA-Based Systems

6. Key Generation for Hardware Obfuscation Using Strong PUFs

7. Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units

8. Hardware Obfuscation of AES through Finite Field Construction Variation

9. An Orthogonal Algorithm for Key Management in Hardware Obfuscation

10. Enhancing Data Security using Obfuscated 128-bit AES Algorithm - An Active Hardware Obfuscation Approach at RTL Level

11. Hardware Obfuscation Using Strong PUFs

12. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation

13. A hardware obfuscation technique for manufacturing a secure 3D IC

14. Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection

15. Exploiting hardware obfuscation methods to prevent and detect hardware Trojans

16. On the Difficulty of FSM-based Hardware Obfuscation

17. Comparative Analysis of Hardware Obfuscation for IP Protection

18. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation

19. VLSI Test and Hardware Security Background for Hardware Obfuscation

20. Graph Similarity and its Applications to Hardware Security

21. SOMA: Security Evaluation of Obfuscation Methods via Attack Sequencing

22. Security Assessment of Dynamically Obfuscated Scan Chain Against Oracle-guided Attacks

23. High-Level Synthesis of Key-Obfuscated RTL IP with Design Lockout and Camouflaging

24. Security of Microfluidic Biochip

25. Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design

26. LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security

27. Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

28. Novel Dynamic State-Deflection Method for Gate-Level Design Obfuscation

29. SAT-attack Resilience Measure for Access Restricted Circuits

30. IP protection through gate-level netlist security enhancement

31. Mystic: Mystifying IP Cores Using an Always-ON FSM Obfuscation Method

32. Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection

33. Area Efficient Functional Locking through Coarse Grained Runtime Reconfigurable Architectures

34. Threats on Logic Locking: A Decade Later

35. A Low Cost MST-FSM Obfuscation Method for Hardware IP Protection

36. Securing Computer Hardware on the Base of Reference Monitor Obfuscation

37. On Custom LUT-based Obfuscation

38. Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack

39. Functional encryption of integrated circuits by key-based hybrid obfuscation

40. Hierarchical Functional Obfuscation of Integrated Circuits using a Mode-Based Approach

41. On Improving the Security of Logic Locking

42. A Practical Logic Obfuscation Technique for Hardware Security

43. A Novel PUF based Logic Encryption Technique to Prevent SAT Attacks and Trojan Insertion

44. Hybrid Obfuscation to Protect against Disclosure Attacks on Embedded Microprocessors

45. Structural modification based netlist obfuscation technique for PLDs

46. AppSAT: Approximately deobfuscating integrated circuits

47. 3D/2.5D IC-Based Obfuscation

48. On meta-obfuscation of physical layouts to conceal design characteristics

49. SARLock: SAT attack resistant logic locking

50. Mitigating SAT Attack on Logic Locking

Catalog

Books, media, physical & digital resources