DSP design protection in CE through algorithmic transformation based structural obfuscation
暂无分享,去创建一个
[1] Keshab K. Parhi. Verifying equivalence of digital signal processing circuits , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[2] Peter Corcoran,et al. User Authentication on Smartphones: Focusing on iris biometrics , 2016, IEEE Consumer Electronics Magazine.
[3] Ze Zhao,et al. Design and implementation of an ASIC-based sensor device for WSN applications , 2009, IEEE Transactions on Consumer Electronics.
[4] Joseph Zambreno,et al. Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.
[5] Farinaz Koushanfar,et al. Active Hardware Metering for Intellectual Property Protection and Security , 2007, USENIX Security Symposium.
[6] Keshab K. Parhi,et al. Obfuscating DSP Circuits via High-Level Transformations , 2015, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[7] Swarup Bhunia,et al. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection , 2009, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[8] Miroslav Popovic,et al. Data flow CAD tool for firniware development and power consumption estimation in multi-core hearing aids , 2016, 2016 IEEE International Conference on Consumer Electronics (ICCE).
[9] Anirban Sengupta. Hardware Security of CE Devices [Hardware Matters] , 2017, IEEE Consumer Electronics Magazine.
[10] Anirban Sengupta,et al. TL-HLS: Methodology for Low Cost Hardware Trojan Security Aware Scheduling With Optimal Loop Unrolling Factor During High Level Synthesis , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[11] Christof Paar,et al. Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques , 2019, IEEE Transactions on Information Forensics and Security.
[12] Jeyavijayan Rajendran,et al. Security analysis of integrated circuit camouflaging , 2013, CCS.
[13] Anirban Sengupta,et al. Intellectual Property Cores: Protection designs for CE products , 2016, IEEE Consumer Electronics Magazine.
[14] Young-Hwan Park,et al. Software-defined DVT-T2 demodulator using scalable DSP processors , 2013, IEEE Transactions on Consumer Electronics.
[15] Jarrod A. Roy,et al. EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.
[16] Yici Cai,et al. Secure and low-overhead circuit obfuscation technique with multiplexers , 2016, 2016 International Great Lakes Symposium on VLSI (GLSVLSI).
[17] Antonio García,et al. IPP@HDL: Efficient Intellectual Property Protection Scheme for IP Cores , 2007, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[18] Farinaz Koushanfar. Hardware Metering: A Survey , 2012 .
[19] Miodrag Potkonjak,et al. Computational forensic techniques for intellectual property protection , 2004, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[20] Jiliang Zhang,et al. A Practical Logic Obfuscation Technique for Hardware Security , 2016, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[21] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[22] Anirban Sengupta,et al. Low overhead symmetrical protection of reusable IP core using robust fingerprinting and watermarking during high level synthesis , 2017, Future Gener. Comput. Syst..
[23] Claudio Cubillos,et al. Obfuscation procedure based in dead code insertion into crypter , 2016, 2016 6th International Conference on Computers Communications and Control (ICCCC).
[24] Eduardo Juárez Martínez,et al. A DVB-H receiver and gateway implementation on a FPGA- and DSP-based platform , 2011, IEEE Transactions on Consumer Electronics.
[25] Anirban Sengupta,et al. Exploring Low Cost Optimal Watermark for Reusable IP Cores During High Level Synthesis , 2016, IEEE Access.
[26] Won Ryu,et al. Home appliance control framework based on smart TV set-top box , 2015, IEEE Transactions on Consumer Electronics.
[27] Saraju P. Mohanty. GPU-CPU multi-core for real-time signal processing , 2009, 2009 Digest of Technical Papers International Conference on Consumer Electronics.
[28] Peng Zhang,et al. High efficiency VLSI implementation of an edge-directed video up-scaler using high level synthesis , 2015, 2015 IEEE International Conference on Consumer Electronics (ICCE).
[29] Yannic Schröder,et al. A privacy-preserving system architecture for applications raising the energy efficiency , 2016, 2016 IEEE 6th International Conference on Consumer Electronics - Berlin (ICCE-Berlin).
[30] Miodrag Potkonjak,et al. Computational forensic techniques for intellectual property protection , 2001, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[31] Jorge Guajardo,et al. Brand and IP protection with physical unclonable functions , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[32] Vyacheslav N. Yarmolik,et al. Obfuscation as Intellectual Rights Protection in VHDL Language , 2007, 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07).