Author:
Badier Hannah,Le Lann Jean-Christophe,Coussy Philippe,Gogniat Guy
Publisher
Springer International Publishing
Reference27 articles.
1. Polian, I., Becker, G.T., Regazzoni, F.: Trojans in early design steps—An emerging threat. In: Proceedings of the Conference on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE) (2016)
2. Pilato, C., Basu, K., Regazzoni, F., Karri, R.: Black-Hat high-level synthesis: Myth or reality? IEEE Trans. Very Large Scale Integr. Syst. 27(4), 913–926 (2018)
3. Dashtbani, M., Rajabzadeh, A., Asghari, M.: High level synthesis as a service. In: 2015 5th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 331–336. IEEE, Piscataway (2015)
4. Veeranna, N., Schafer, B.C.: Efficient behavioral intellectual properties source code obfuscation for high-level synthesis. In: 2017 18th IEEE Latin American Test Symposium (LATS), pp. 1–6. IEEE, Piscataway (2017)
5. Baumgarten, A., Tyagi, A., Zambreno, J.: Preventing IC piracy using reconfigurable logic barriers. IEEE Design Test Comput. 27(1), 66–75 (2010)