Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,756 papers from all fields of science
Search
Sign In
Create Free Account
Hardware obfuscation
Hardware obfuscation is a technique by which the description or the structure of electronic hardware is modified to intentionally conceal its…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Adversary (cryptography)
Black box
Digital watermarking
Electronic circuit
Expand
Broader (2)
Electronic design automation
Electronic engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Security Vulnerabilities in Applying Decentralized Ledger Systems for Obfuscating Hardwares
J. P. Mohanty
,
K. Mahapatra
International Symposium on Smart Electronic…
2019
Corpus ID: 211242552
Security in daily transactions, not only in the financial sector, but also in various upcoming Industrial smart application areas…
Expand
2019
2019
An Orthogonal Algorithm for Key Management in Hardware Obfuscation
Jiawei Wang
,
Yuejun Zhang
,
+4 authors
Qiaoyan Yu
Asian Hardware-Oriented Security and Trust…
2019
Corpus ID: 211298470
The globalization of supply chain makes semiconductor chips susceptible to various security threats. Design obfuscation…
Expand
Review
2018
Review
2018
Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection
Qiaoyan Yu
,
Jaya Dofe
,
Zhiming Zhang
,
S. Kramer
2018
Corpus ID: 196016409
The globalized semiconductor supply chain make integrated circuits (ICs) potentially suffer from diverse security threats. Among…
Expand
2018
2018
Securing Computer Hardware on the Base of Reference Monitor Obfuscation
V. Gorbachov
,
Abdulrahman Kataeba Batiaa
,
Olha Ponomarenko
,
E. Kulak
International Scientific-Practical Conference…
2018
Corpus ID: 59600968
Widespread outsourcing of integrated circuits fabrication increases the vulnerability to security threats. In this paper, we…
Expand
2018
2018
Hardware Obfuscation for Finite Field Algorithms
Ankur A Sharma
2018
Corpus ID: 181973576
With the rise of computing devices, the security robustness of the devices has become of utmost importance. Companies invest huge…
Expand
2017
2017
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model
Nishanth Chandran
,
Wutichai Chongchitmate
,
R. Ostrovsky
,
Ivan Visconti
IACR Cryptology ePrint Archive
2017
Corpus ID: 3610189
In this work we introduce the corruptible token model. This model generalizes the stateless tamper-proof token model introduced…
Expand
2016
2016
Structural modification based netlist obfuscation technique for PLDs
G. Sumathi
,
L. Srivani
,
D. T. Murthy
,
Anish Kumar
,
K. Madhusoodanan
,
S. S. Satya Murty
International Conference on Wireless…
2016
Corpus ID: 14465132
Logic obfuscation is widely followed in intellectual property cores and chip designs as hardware protection mechanism against…
Expand
2015
2015
Hardware IP Protection through Gate-Level Obfuscation
Dongfang Li
,
Wenchao Liu
,
X. Zou
,
Zhenglin Liu
International Conference on Computer-Aided Design…
2015
Corpus ID: 14108566
Hardware Intellectual Property (IP) cores have emerged as an integral part of modern System-on-Chip (SoC) designs. However…
Expand
2015
2015
Obfuscation in DSP algorithms using high level transformations for hardware protection
K. S. Sunumol
,
N. Shanu
IEEE Recent Advances in Intelligent Computational…
2015
Corpus ID: 16473238
This paper presents a method to protect digital signal processing (DSP) circuits through obfuscation by using high-level…
Expand
2014
2014
IMPLEMENTATION OF OPAQUE PREDICATES FOR FPGA DESIGNS HARDWARE OBFUSCATION
V. V. Sergeichik
,
A. A. Ivaniuk
2014
Corpus ID: 61131220
Obfuscation is a technique, which makes design less intelligible in order to complicate reverse engineering. In this paper, we…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE