On the Difficulty of FSM-based Hardware Obfuscation
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy. To protect against this threat, numerous defenses based on the obfuscation of a circuit’s control path, i.e. Finite State...
Main Authors: | Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, Christof Paar |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2018-08-01
|
Series: | Transactions on Cryptographic Hardware and Embedded Systems |
Subjects: | |
Online Access: | https://tches.iacr.org/index.php/TCHES/article/view/7277 |
Similar Items
-
Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging
by: Max Hoffmann, et al.
Published: (2020-12-01) -
ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
by: M. Sazadur Rahman, et al.
Published: (2023-01-01) -
Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques
by: Thejaswini P, et al.
Published: (2022-12-01) -
A Novel Probability-Based Logic-Locking Technique: ProbLock
by: Michael Yue, et al.
Published: (2021-12-01) -
A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking
by: Zahra Mirmohammadi, et al.
Published: (2023-02-01)