Automatic netlist scrambling methodology in ASIC design flow to hinder the reverse engineering
暂无分享,去创建一个
[1] Xuefei Leng,et al. Smart card applications and security , 2009, Inf. Secur. Tech. Rep..
[2] Helena Handschuh,et al. Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware , 2001, CHES.
[3] Swarup Bhunia,et al. Hardware protection and authentication through netlist level obfuscation , 2008, ICCAD 2008.
[4] Joseph Zambreno,et al. Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.
[5] Rudy Lauwereins,et al. Design, Automation, and Test in Europe , 2008 .
[6] Swarup Bhunia,et al. On-demand transparency for improving hardware Trojan detectability , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[7] Swarup Bhunia,et al. Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation , 2011, J. Electron. Test..
[8] Miodrag Potkonjak,et al. Remote activation of ICs for piracy prevention and digital right management , 2007, 2007 IEEE/ACM International Conference on Computer-Aided Design.
[9] Jarrod A. Roy,et al. Protecting bus-based hardware IP by secret sharing , 2008, 2008 45th ACM/IEEE Design Automation Conference.