Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 211,136,162 papers from all fields of science
Search
Sign In
Create Free Account
Hardware obfuscation
Hardware obfuscation is a technique by which the description or the structure of electronic hardware is modified to intentionally conceal its…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Adversary (cryptography)
Black box
Digital watermarking
Electronic circuit
Expand
Broader (2)
Electronic design automation
Electronic engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques
Arunkumar Vijayakumar
,
Vinay C. Patil
,
Daniel E. Holcomb
,
C. Paar
,
S. Kundu
IEEE Transactions on Information Forensics and…
2019
Corpus ID: 2130144
The threat of hardware reverse engineering is a growing concern for a large number of applications. A main defense strategy…
Expand
2018
2018
Novel Dynamic State-Deflection Method for Gate-Level Design Obfuscation
Jaya Dofe
,
Qiaoyan Yu
IEEE Transactions on Computer-Aided Design of…
2018
Corpus ID: 1457559
The emerging security threats in the integrated circuit supply chain do not only challenge the chip integrity, but also raise…
Expand
Highly Cited
2018
Highly Cited
2018
SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation
Prabuddha Chakraborty
,
Jonathan Cruz
,
S. Bhunia
Asian Hardware-Oriented Security and Trust…
2018
Corpus ID: 52892745
Obfuscation is a technique for protecting hardware intellectual property (IP) blocks against reverse engineering, piracy, and…
Expand
Review
2018
Review
2018
On the Difficulty of FSM-based Hardware Obfuscation
Marc Fyrbiak
,
Sebastian Wallat
,
+4 authors
C. Paar
IACR Trans. Cryptogr. Hardw. Embed. Syst.
2018
Corpus ID: 53115478
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse…
Expand
Review
2017
Review
2017
Comparative Analysis of Hardware Obfuscation for IP Protection
Sarah Amir
,
Bicky Shakya
,
Domenic Forte
,
M. Tehranipoor
,
S. Bhunia
ACM Great Lakes Symposium on VLSI
2017
Corpus ID: 28248002
In the era of globalized Integrated Circuit (IC) design and manufacturing flow, a rising issue to the silicon industry is various…
Expand
2016
2016
DSD: A Dynamic State-Deflection Method for Gate-Level Netlist Obfuscation
Jaya Dofe
,
Yuejun Zhang
,
Qiaoyan Yu
IEEE Computer Society Annual Symposium on VLSI
2016
Corpus ID: 18335384
The emerging security threats in the IC supply chain do not only challenge the chip integrity, but also raise serious concerns on…
Expand
2015
2015
Development of a Layout-Level Hardware Obfuscation Tool
Shweta Malik
,
G. Becker
,
C. Paar
,
W. Burleson
IEEE Computer Society Annual Symposium on VLSI
2015
Corpus ID: 2955807
While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation…
Expand
2015
2015
Hardware IP Protection through Gate-Level Obfuscation
Dongfang Li
,
Wenchao Liu
,
X. Zou
,
Zhenglin Liu
International Conference on Computer-Aided Design…
2015
Corpus ID: 14108566
Hardware Intellectual Property (IP) cores have emerged as an integral part of modern System-on-Chip (SoC) designs. However…
Expand
Highly Cited
2014
Highly Cited
2014
Hardware obfuscation using PUF-based logic
James Bradley Wendt
,
M. Potkonjak
IEEE/ACM International Conference on Computer…
2014
Corpus ID: 3006766
There is a great need to develop universal and robust techniques for intellectual property protection of integrated circuits. In…
Expand
Highly Cited
2004
Highly Cited
2004
Hardware assisted control flow obfuscation for embedded processors
Xiaotong Zhuang
,
Zhang Tao
,
H. Lee
,
S. Pande
International Conference on Compilers…
2004
Corpus ID: 2589663
With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE