Examining Tradeoffs for Hardware-Based Intellectual Property Protection

@inproceedings{McDonald2011ExaminingTF,
  title={Examining Tradeoffs for Hardware-Based Intellectual Property Protection},
  author={Jeffrey Todd McDonald and Yong C. Kim},
  year={2011}
}
The ability to protect critical cyber infrastructure remains a multi-faceted problem facing both the commercial sector and the federal government. Hardware intellectual property (IP) embedded within application-specific integrated circuits and programmable logic devices are subject to adversarial analysis in the form of subversion, piracy, and reverse engineering. We consider the effect of transforming the programmatic logic or netlist definitions for such environments so that malicious… CONTINUE READING
3 Citations
6 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-6 of 6 references

Considering Software Protection for Embedded Systems ”

  • Y. Kim, J. McDonald
  • Crosstalk : The Journal of Defense Software…
  • 2009
1 Excerpt

Considering Software Protection for Embedded Systems”, Crosstalk

  • Jan
  • The Journal of Defense Software Engineering, Sept…
  • 2009

Sub - circuit Selection and Replacement Algorithms Modeled as Term Rewriting Systems ”

  • E. Simonaire
  • 2008
1 Excerpt

La Cryptographie Militaire ”

  • A. Springer. Kerckhoff
  • Journal des sciences militaires
  • 1883

Similar Papers

Loading similar papers…