Split-fabrication obfuscation: Metrics and techniques
暂无分享,去创建一个
[1] Ahmed El-Mahdy,et al. Cloud Protection by Obfuscation: Techniques and Metrics , 2012, 2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[2] Swarup Bhunia,et al. RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation , 2010, 2010 23rd International Conference on VLSI Design.
[3] Siddharth Garg,et al. Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation , 2013, USENIX Security Symposium.
[4] Samantha Jenkins,et al. Information theory-based software metrics and obfuscation , 2004, J. Syst. Softw..
[5] Jeyavijayan Rajendran,et al. Is split manufacturing secure? , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[6] Michael S. Hsiao,et al. ODETTE: A non-scan design-for-test methodology for Trojan detection in ICs , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[7] Ian Vince McLoughlin. Secure Embedded Systems: The Threat of Reverse Engineering , 2008, 2008 14th IEEE International Conference on Parallel and Distributed Systems.