Search

Your search keyword '"Hardware obfuscation"' showing total 52 results

Search Constraints

Start Over You searched for: Descriptor "Hardware obfuscation" Remove constraint Descriptor: "Hardware obfuscation" Topic computer Remove constraint Topic: computer
52 results on '"Hardware obfuscation"'

Search Results

1. LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection

2. BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person

3. High-Level Synthesis of Key-Obfuscated RTL IP with Design Lockout and Camouflaging

4. Hardware Obfuscation and Logic Locking: A Tutorial Introduction

5. Security of Microfluidic Biochip

6. Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher

7. Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art

8. SOMA: Security Evaluation of Obfuscation Methods via Attack Sequencing

9. UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking

10. Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

11. Security Assessment of High-Level Synthesis

12. Netlist-based Measures for Hardware Obfuscation: A Preliminary Study

13. Hardware obfuscation for IP protection

14. Development and Evaluation of Hardware Obfuscation Benchmarks

15. Security Vulnerabilities in Applying Decentralized Ledger Systems for Obfuscating Hardwares

16. Hardware Security-present and Future Trends

17. Key Generation for Hardware Obfuscation Using Strong PUFs

18. On Custom LUT-based Obfuscation

19. Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection

20. A Practical Logic Obfuscation Technique for Hardware Security

21. A Unified Methodology for Hardware Obfuscation and IP Watermarking

22. Threats on Logic Locking: A Decade Later

23. A Low Cost MST-FSM Obfuscation Method for Hardware IP Protection

24. A Novel PUF based Logic Encryption Technique to Prevent SAT Attacks and Trojan Insertion

25. Securing Computer Hardware on the Base of Reference Monitor Obfuscation

26. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation

27. Mystic: Mystifying IP Cores Using an Always-ON FSM Obfuscation Method

28. Hardware Obfuscation Using Strong PUFs

29. Solving the Third-Shift Problem in IC Piracy With Test-Aware Logic Locking

30. Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack

31. Exploiting hardware obfuscation methods to prevent and detect hardware Trojans

32. Comparative Analysis of Hardware Obfuscation for IP Protection

33. AppSAT: Approximately deobfuscating integrated circuits

34. A Primer on Hardware Security: Models, Methods, and Metrics

35. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation

36. Permutation-Based Obfuscation

37. Hybrid Obfuscation to Protect against Disclosure Attacks on Embedded Microprocessors

38. VLSI Test and Hardware Security Background for Hardware Obfuscation

39. Hardware Protection through Obfuscation

40. On meta-obfuscation of physical layouts to conceal design characteristics

41. SARLock: SAT attack resistant logic locking

42. Ending Piracy of Integrated Circuits

43. Preventing IC Piracy Using Reconfigurable Logic Barriers

44. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection

45. Obfuscation-Based Secure SoC Design for Protection Against Piracy and Trojan Attacks

46. Development of a Layout-Level Hardware Obfuscation Tool

47. A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans

48. Obfuscation and watermarking of FPGA designs based on constant value generators

49. Security analysis of logic obfuscation

50. Security against hardware Trojan through a novel application of design obfuscation

Catalog

Books, media, physical & digital resources