Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Hardware obfuscation

Hardware obfuscation is a technique by which the description or the structure of electronic hardware is modified to intentionally conceal its… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Obfuscation is a technique for protecting hardware intellectual property (IP) blocks against reverse engineering, piracy, and… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
2018
2018
  • Jaya Dofe, Q. Yu
  • IEEE Transactions on Computer-Aided Design of…
  • 2018
  • Corpus ID: 1457559
The emerging security threats in the integrated circuit supply chain do not only challenge the chip integrity, but also raise… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 5
  • figure 4
Is this relevant?
2018
2018
Obfuscation is a promising solution for securing hardware intellectual property (IP) against various attacks, such as reverse… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2017
Review
2017
The threat of hardware reverse engineering is a growing concern for a large number of applications. A main defense strategy… Expand
  • table I
  • figure 1
  • figure 2
  • figure 5
  • figure 3
Is this relevant?
2017
2017
While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation… Expand
Is this relevant?
2015
2015
Hardware Intellectual Property (IP) cores have emerged as an integral part of modern System-on-Chip (SoC) designs. However… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2015
2015
While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation… Expand
  • figure 1
  • figure 4
  • figure 2
  • figure 3
  • table II
Is this relevant?
Highly Cited
2014
Highly Cited
2014
There is a great need to develop universal and robust techniques for intellectual property protection of integrated circuits. In… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?