Embedding of signatures in reconfigurable scan architecture for authentication of intellectual properties in system‐on‐chip

Author:

Saha Debasri1,Sur‐Kolay Susmita2

Affiliation:

1. A.K. Choudhury School of Information TechnologyUniversity of CalcuttaKolkataIndia

2. Advanced Computing & Microelectronics UnitIndian Statistical InstituteKolkataIndia

Publisher

Institution of Engineering and Technology (IET)

Subject

Electrical and Electronic Engineering,Hardware and Architecture,Software

Reference18 articles.

1. Constraint‐based watermarking techniques for design IP protection;Kahng A.B.;IEEE Trans. CAD Integr. Circuits Syst.,2001

2. Alkabani Y. Koushanfar F. Potkonjak M.: ‘Remote activation of ICs for privacy prevention and digital right management’.Proc. Int. Conf. on Computer‐Aided Design (ICCAD) 2007 pp.674–677

3. Huang J. Lach J.: ‘IC activation and user authentication for security‐sensitive systems’.Proc. Int. Symp. on Hardware‐Oriented Security and Trust 2008 pp.76–80

4. HARPOON: an obfuscation‐based SOC design methodology for hardware protection;Chakraborty R.S.;IEEE Trans. CAD Integr. Circuits Syst.,2009

5. Techniques for design and implementation of secure reconfigurable PUFs;Majzoobi M.;ACM Trans. Reconfigurable Technol. Syst.,2009

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Criticality based Reduction of Security Costs in a FPGA based Cloud Computing Farm;2021 34th International Conference on VLSI Design and 2021 20th International Conference on Embedded Systems (VLSID);2021-02

2. Introduction to Hardware Security for FPGA Based Systems;Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms;2021

3. Dynamic power-aware scheduling of real-time tasks for FPGA-based cyber physical systems against power draining hardware trojan attacks;The Journal of Supercomputing;2020-02-13

4. A Multi-Agent Co-operative Model to Facilitate Criticality based Reliability for Mixed Critical Task Execution on FPGA based Cloud Environment;2020 33rd International Conference on VLSI Design and 2020 19th International Conference on Embedded Systems (VLSID);2020-01

5. Criticality based reliability against hardware Trojan attacks for processing of tasks on reconfigurable hardware;Microprocessors and Microsystems;2019-11

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3