PROTECTS: Progressive Rtl Obfuscation with ThrEshold Control Technique during architectural Synthesis
Abstract
References
Index Terms
- PROTECTS: Progressive Rtl Obfuscation with ThrEshold Control Technique during architectural Synthesis
Recommendations
On Custom LUT-based Obfuscation
GLSVLSI '19: Proceedings of the 2019 Great Lakes Symposium on VLSILogic obfuscation yields hardware security against various threats, such as Intellectual Property (IP) piracy and reverse engineering. Evolving Boolean satisfiability (SAT) attacks have challenged the hardware security assurance rendered by various ...
Security against hardware Trojan through a novel application of design obfuscation
ICCAD '09: Proceedings of the 2009 International Conference on Computer-Aided DesignMalicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel application of a key-based obfuscation technique to achieve security against hardware Trojans. The ...
Obfuscation: The Hidden Malware
A cyberwar exists between malware writers and antimalware researchers. At this war's heart rages a weapons race that originated in the 80s with the first computer virus. Obfuscation is one of the latest strategies to camouflage the telltale signs of ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Journal Family
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- SERB, Government of India
- Ministry of Education, Government of India, through the Prime Minister Research Fellowship
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 81Total Downloads
- Downloads (Last 12 months)81
- Downloads (Last 6 weeks)77
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in