2015 IEEE Computer Society Annual Symposium on VLSI 2015
DOI: 10.1109/isvlsi.2015.118
|View full text |Cite
|
Sign up to set email alerts
|

Development of a Layout-Level Hardware Obfuscation Tool

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
2

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(18 citation statements)
references
References 4 publications
0
15
2
Order By: Relevance
“…For a more meaningful comparison, we also consider relatively small scales for LC (10% up to 30%). Here, the primitive advocated by Zhang [11] appears as the weakest, and the one proposed by Malik et al [41] seems the most resilient. Our primitive is next only to that of Wang et al [10] and that of Malik et al [41].…”
Section: B Security Evaluationmentioning
confidence: 90%
See 1 more Smart Citation
“…For a more meaningful comparison, we also consider relatively small scales for LC (10% up to 30%). Here, the primitive advocated by Zhang [11] appears as the weakest, and the one proposed by Malik et al [41] seems the most resilient. Our primitive is next only to that of Wang et al [10] and that of Malik et al [41].…”
Section: B Security Evaluationmentioning
confidence: 90%
“…Here, the primitive advocated by Zhang [11] appears as the weakest, and the one proposed by Malik et al [41] seems the most resilient. Our primitive is next only to that of Wang et al [10] and that of Malik et al [41]. Now, it is also important to recall that our proposed technique incurs significantly smaller PPA cost than these schemes [10], [41].…”
Section: B Security Evaluationmentioning
confidence: 90%
“…Another method to conceal connections is through adding connections through diffusion [10]. By doing so, one can create inverters that are stuck at a logic one, or a logic zero.…”
Section: Obfuscated Defensesmentioning
confidence: 99%
“…The disadvantage of this approach is a large increase in area and delay. One paper reported that this approach increased the area by 587% and the delay by 250% [10].…”
Section: Obfuscated Defensesmentioning
confidence: 99%
“…The main defence strategy of the designer is hardware obfuscation to prevent such invasive attacks [5]. Over the last few years, several device, circuit, and system level obfuscation methods have been proposed [6][7][8]. Physical design obfuscation is one that creates stealthy manipulations by changing doping concentration and dielectric material which grabbed recent attention, as it is hard to apply RE [9,10].…”
Section: Introductionmentioning
confidence: 99%