2022 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS) 2022
DOI: 10.1109/ddecs54261.2022.9770141
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Obfuscation of Digital FIR Filters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…Although there exist many efficient high-level and behavioral obfuscation methods proposed for protecting IPs [8]- [13], digital FIR filters require specialized obfuscation techniques, since they should behave according to their specifications, such as passband and stopband frequencies and ripples [14]. However, there exist only a limited number of techniques proposed to obfuscate DSP circuits and especially, digital filters [15]- [18]. The technique of [15] generates the desired filter and also its obfuscated versions, grouped in two categories as meaningful and unmeaningful in terms of filter behavior, using high-level transformations, and combines these realizations using a key-based finite state machine and a reconfigurator.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Although there exist many efficient high-level and behavioral obfuscation methods proposed for protecting IPs [8]- [13], digital FIR filters require specialized obfuscation techniques, since they should behave according to their specifications, such as passband and stopband frequencies and ripples [14]. However, there exist only a limited number of techniques proposed to obfuscate DSP circuits and especially, digital filters [15]- [18]. The technique of [15] generates the desired filter and also its obfuscated versions, grouped in two categories as meaningful and unmeaningful in terms of filter behavior, using high-level transformations, and combines these realizations using a key-based finite state machine and a reconfigurator.…”
Section: Introductionmentioning
confidence: 99%
“…To make the reverse engineering of coefficients harder for an end-user, adding input and output noises was proposed in [16]. Recently, we introduced a hardware obfuscation technique that hides the filter coefficients behind decoys [17], [18]. In [17], decoys can be selected based on their Hamming distance to reduce the hardware complexity or chosen randomly to increase the corruption at the filter output.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations