2019
DOI: 10.1504/ijmis.2019.104796
|View full text |Cite
|
Sign up to set email alerts
|

Hardware security threats and countermeasures: a study of obfuscation, camouflaging and PUFs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Another way of making camouflaged cells is termed as ‘covert gate’ that leverages doping and dummy contacts to create camouflaged cells [ 39 ]. Few other methods are also popular, like SRAM based camouflaging and filler cell based camouflaging [ 40 ]. These methods make the overall performance slower than common methods as they need extra layers or extra cells along with the logic gates.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…Another way of making camouflaged cells is termed as ‘covert gate’ that leverages doping and dummy contacts to create camouflaged cells [ 39 ]. Few other methods are also popular, like SRAM based camouflaging and filler cell based camouflaging [ 40 ]. These methods make the overall performance slower than common methods as they need extra layers or extra cells along with the logic gates.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…Another way of making camouflaged cells is termed as 'covert gate' that leverages doping and dummy contacts to create camouflaged cells [39]. Few other methods are also popular, like SRAM based camouflaging and filler cell based camouflaging [40]. These methods make the overall performance slower than common methods as they need extra layers or extra cells along with the logic gates.…”
Section: Related Work and Motivationmentioning
confidence: 99%