High-level synthesis of key based obfuscated RTL datapaths
暂无分享,去创建一个
[1] Shaojie Zhang,et al. Netlist reverse engineering for high-level functionality reconstruction , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).
[2] Swarup Bhunia,et al. RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation , 2010, 2010 23rd International Conference on VLSI Design.
[3] Giovanni De Micheli,et al. Synthesis and Optimization of Digital Circuits , 1994 .
[4] Srinivas Katkoori,et al. A novel method for watermarking sequential circuits , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.
[5] Miodrag Potkonjak,et al. Techniques for foundry identification , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[6] Farinaz Koushanfar,et al. Active Hardware Metering for Intellectual Property Protection and Security , 2007, USENIX Security Symposium.
[7] Li Li,et al. Structural transformation for best-possible obfuscation of sequential circuits , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[8] Sandhya Koteshwara,et al. Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design , 2018, IEEE Transactions on Information Forensics and Security.
[9] Michael S. Hsiao,et al. Interlocking obfuscation for anti-tamper hardware , 2013, CSIIRW '13.
[10] Swarup Bhunia,et al. Hardware protection and authentication through netlist level obfuscation , 2008, ICCAD 2008.
[11] Miodrag Potkonjak,et al. Behavioral synthesis techniques for intellectual property protection , 2005, TODE.
[12] Swarup Bhunia,et al. Security through obscurity: An approach for protecting Register Transfer Level hardware IP , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[13] Gary McGraw. Software Security , 2012, Datenschutz und Datensicherheit - DuD.
[14] Miodrag Potkonjak,et al. Effective iterative techniques for fingerprinting design IP , 1999, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[15] Ingrid Verbauwhede,et al. Analysis and design of active IC metering schemes , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[16] Swarup Bhunia,et al. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection , 2009, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[17] Ronald P. Cocchi,et al. Circuit camouflage integration for hardware IP protection , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[18] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[19] Farinaz Koushanfar,et al. Integrated circuits metering for piracy protection and digital rights management: an overview , 2011, GLSVLSI '11.
[20] Srinivas Katkoori,et al. A multi-parameter functional side-channel analysis method for hardware trust verification , 2013, 2013 IEEE 31st VLSI Test Symposium (VTS).