PROTECTS: Progressive Rtl Obfuscation with ThrEshold Control Technique during architectural Synthesis
Abstract
References
Index Terms
- PROTECTS: Progressive Rtl Obfuscation with ThrEshold Control Technique during architectural Synthesis
Recommendations
On Custom LUT-based Obfuscation
GLSVLSI '19: Proceedings of the 2019 Great Lakes Symposium on VLSILogic obfuscation yields hardware security against various threats, such as Intellectual Property (IP) piracy and reverse engineering. Evolving Boolean satisfiability (SAT) attacks have challenged the hardware security assurance rendered by various ...
A New Dynamic Countermeasure to Strengthen Design Obfuscation in FPGAs
FPGAs are being challenged by various security threats, including reverse engineering attacks, hardware tampering, and side-channel analysis attacks. Although the existing static obfuscation methods can protect FPGA systems from IP piracy and hardware ...
Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT
AbstractThe global market of developing Internet of Things (IoT) devices increases rapidly with improved design goals like cost, energy efficiency, and performance. Unfortunately, the above design goals often come at the expense of security. Illegal ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Journal Family
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- SERB, Government of India
- Ministry of Education, Government of India, through the Prime Minister Research Fellowship
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 124Total Downloads
- Downloads (Last 12 months)124
- Downloads (Last 6 weeks)12
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in