Scaling Logic Locking Schemes to Multi-module Hardware Designs
暂无分享,去创建一个
[1] Luca Benini,et al. The Cost of Application-Class Processing: Energy and Performance Analysis of a Linux-Ready 1.7-GHz 64-Bit RISC-V Core in 22-nm FDSOI Technology , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[2] Siddharth Garg,et al. Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation , 2013, USENIX Security Symposium.
[3] Ozgur Sinanoglu,et al. Evolution of logic locking , 2017, 2017 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC).
[4] Farinaz Koushanfar,et al. Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management , 2012, IEEE Transactions on Information Forensics and Security.
[5] Avesta Sasan,et al. Threats on Logic Locking: A Decade Later , 2019, ACM Great Lakes Symposium on VLSI.
[6] Peter A. Beerel,et al. System-Level Framework for Logic Obfuscation with Quantified Metrics for Evaluation , 2019, 2019 IEEE Cybersecurity Development (SecDev).
[7] M. Tehranipoor,et al. Hardware Trojans: Lessons Learned after One Decade of Research , 2016, TODE.
[8] Mark Mohammad Tehranipoor,et al. A low-cost solution for protecting IPs against scan-based side-channel attacks , 2006, 24th IEEE VLSI Test Symposium.
[9] Yunsup Lee,et al. The RISC-V Instruction Set Manual , 2014 .
[10] Rainer Leupers,et al. A Unifying logic encryption security metric , 2018, SAMOS.
[11] Rainer Leupers,et al. Inter-Lock: Logic Encryption for Processor Cores Beyond Module Boundaries , 2019, 2019 IEEE European Test Symposium (ETS).
[12] Ozgur Sinanoglu,et al. Transforming between logic locking and IC camouflaging , 2015, 2015 10th International Design & Test Symposium (IDT).
[13] Jarrod A. Roy,et al. EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.
[14] Ujjwal Guin,et al. TAAL: Tampering Attack on Any Key-based Logic Locked Circuits , 2019, ArXiv.
[15] Andrew Waterman,et al. The RISC-V Instruction Set Manual. Volume 1: User-Level ISA, Version 2.0 , 2014 .
[16] Jeffrey J. Rodriguez,et al. Watermarking ICs for IP protection , 2002 .