Search

Your search keyword '"Hardware obfuscation"' showing total 78 results

Search Constraints

Start Over You searched for: "Hardware obfuscation" Remove constraint "Hardware obfuscation" Topic computer science Remove constraint Topic: computer science
78 results on '"Hardware obfuscation"'

Search Results

1. Preventing DNN Model IP Theft via Hardware Obfuscation

2. Hardware Obfuscation and Logic Locking: A Tutorial Introduction

3. On the Construction of Composite Finite Fields for Hardware Obfuscation

4. Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher

5. Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art

8. Hardware obfuscation for IP protection

9. Development and Evaluation of Hardware Obfuscation Benchmarks

10. Netlist-based Measures for Hardware Obfuscation: A Preliminary Study

11. Hardware Obfuscation Techniques on FPGA-Based Systems

12. Key Generation for Hardware Obfuscation Using Strong PUFs

13. Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units

14. Hardware Obfuscation of AES through Finite Field Construction Variation

15. An Orthogonal Algorithm for Key Management in Hardware Obfuscation

16. Enhancing Data Security using Obfuscated 128-bit AES Algorithm - An Active Hardware Obfuscation Approach at RTL Level

17. Hardware Obfuscation Using Strong PUFs

18. A Unified Methodology for Hardware Obfuscation and IP Watermarking

19. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation

20. A hardware obfuscation technique for manufacturing a secure 3D IC

21. Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection

22. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation

23. VLSI Test and Hardware Security Background for Hardware Obfuscation

24. Development of a Layout-Level Hardware Obfuscation Tool

25. BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person

26. LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection

27. Hardware Security Exploiting Post-CMOS Devices: Fundamental Device Characteristics, State-of-the-Art Countermeasures, Challenges and Roadmap

28. Graph Similarity and its Applications to Hardware Security

29. High-level Intellectual Property Obfuscation via Decoy Constants

30. SOMA: Security Evaluation of Obfuscation Methods via Attack Sequencing

31. Security Assessment of Dynamically Obfuscated Scan Chain Against Oracle-guided Attacks

32. High-Level Synthesis of Key-Obfuscated RTL IP with Design Lockout and Camouflaging

33. Security of Microfluidic Biochip

34. Tunnel FET‐based ultralow‐power and hardware‐secure circuit design considering p‐i‐n forward leakage

35. Top-down Physical Design of Soft Embedded FPGA Fabrics

36. Hardware Redaction via Designer-Directed Fine-Grained eFPGA Insertion

37. Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design

38. Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

39. Novel Dynamic State-Deflection Method for Gate-Level Design Obfuscation

40. SAT-attack Resilience Measure for Access Restricted Circuits

41. Obfuscation Algorithm Design Based on Fully Homomorphism

42. Mystic: Mystifying IP Cores Using an Always-ON FSM Obfuscation Method

43. Security Vulnerabilities in Applying Decentralized Ledger Systems for Obfuscating Hardwares

44. Hybrid Memristor-CMOS Obfuscation Against Untrusted Foundries

45. Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection

46. Area Efficient Functional Locking through Coarse Grained Runtime Reconfigurable Architectures

47. UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking

48. Security Assessment of High-Level Synthesis

49. Threats on Logic Locking: A Decade Later

50. A Low Cost MST-FSM Obfuscation Method for Hardware IP Protection

Catalog

Books, media, physical & digital resources