Obfuscating the Hierarchy of a Digital IP
暂无分享,去创建一个
[1] Mayler G. A. Martins,et al. Evaluating Architectural, Redundancy, and Implementation Strategies for Radiation Hardening of FinFET Integrated Circuits , 2021, IEEE Transactions on Nuclear Science.
[2] Lawrence Pileggi,et al. Latch-Based Logic Locking , 2020, 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[3] Marie-Lise Flottes,et al. Logic Locking: A Survey of Proposed Methods and Evaluation Metrics , 2019, J. Electron. Test..
[4] Song Han,et al. Fast inference of deep neural networks in FPGAs for particle physics , 2018, Journal of Instrumentation.
[5] Shaojie Zhang,et al. Netlist reverse engineering for high-level functionality reconstruction , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).
[6] Sayak Ray,et al. Evaluating the security of logic encryption algorithms , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[7] Christof Paar,et al. Stealthy dopant-level hardware Trojans: extended version , 2013, Journal of Cryptographic Engineering.
[8] Jeyavijayan Rajendran,et al. Is split manufacturing secure? , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[9] Jarrod A. Roy,et al. EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.
[10] Zhaokun Han,et al. Does logic locking work with EDA tools? , 2021, USENIX Security Symposium.
[11] Christof Paar,et al. DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering , 2020, IACR Cryptol. ePrint Arch..