3.8 Proceedings Paper

Logic Locking of Finite-State Machines Using Transition Obfuscation

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Novel Dynamic State-Deflection Method for Gate-Level Design Obfuscation

Jaya Dofe et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2018)

Article Engineering, Electrical & Electronic

Hardware Trojan Attacks: Threat Analysis and Countermeasures

Swarup Bhunia et al.

PROCEEDINGS OF THE IEEE (2014)

Article Computer Science, Theory & Methods

Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management

Farinaz Koushanfar

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Hardware & Architecture

HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection

Rajat Subhra Chakraborty et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2009)