Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference39 articles.
1. Aksoy L et al (2021) "High-level Intellectual Property Obfuscation via Decoy Constants," Proc. IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS). 1–7. https://doi.org/10.1109/IOLTS52814.2021.9486714
2. Alaql A, Hoque T, Forte D, Bhunia S (2019) "Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection," Proc. IEEE 37th VLSI Test Symposium (VTS). 1–6. https://doi.org/10.1109/VTS.2019.8758637
3. Alkabani Y, Koushanfar F (2007) “Active Hardware Metering for Intellectual Property Protection and Security.” USENIX Security Symposium 291–306
4. Amir S, Shakya B, Xiaolin Xu, Jin Y, Bhunia S, Tehranipoor MM, Forte D (2018) Development and Evaluation of Hardware Obfuscation Benchmarks. Journal of Hardware and Systems Security 2:142–161. https://doi.org/10.1007/s41635-018-0036-3
5. Baluprithviraj KN, Vijayachitra S (2020) Optimization of Logic Obfuscation Technique for Hardware Security. Int J Sci Technol Res 9:1044–1048
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification;International Journal of Reconfigurable Computing;2023-07-03
2. Device-specific security challenges and solution in IoT edge computing: a review;The Journal of Supercomputing;2023-06-17
3. Attacks by Hardware Trojans on Neural Networks;Advances in Systems Analysis, Software Engineering, and High Performance Computing;2023-06-16
4. Design of INV/BUFF Logic Locking For Enhancing the Hardware Security;Journal of Electronic Testing;2023-04
5. Area Reduction AES Algorithm in Hardware Trojan Detection;2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS);2023-02-02