Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hardware obfuscation
biblio
High-level Intellectual Property Obfuscation via Decoy Constants
Submitted by grigby1 on Wed, 06/08/2022 - 9:21am
intellectual property security
SAT attack
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
Logic gates
IP obfuscation
pattern locks
intellectual property
hardware obfuscation
Hardware
Foundries
digital FIR filter design
composability
Complexity theory
automatic test pattern generation
biblio
A Novel PUF based Logic Encryption Technique to Prevent SAT Attacks and Trojan Insertion
Submitted by aekwall on Mon, 11/09/2020 - 12:33pm
intellectual property/IC
IP piracy
SAT attack
hardware obfuscation
Anti-Trojan insertion algorithm
Controllability
copy protection
design-for-trust
hardware Trojan insertion
HT insertion
hardware trojan
logic encryption methods
logic encryption techniques
logic locking
PUF based logic encryption technique
PUF-based encryption
Rare Signal
reverse engineering attack
unique encryption
Hardware Security
encryption
Hardware
invasive software
Resiliency
pubcrawl
composability
policy-based governance
Trojan horses
integrated circuits
Cryptography
Topology
Logic gates
industrial property
reverse engineering
integrated circuit design
logic circuits
Physical Unclonable Function
encryption key
biblio
FPGA IP Obfuscation Using Ring Oscillator Physical Unclonable Function
Submitted by aekwall on Mon, 11/09/2020 - 12:31pm
logic design
ring oscillator physical unclonable function
ring oscillator based physical unclonable function
Ring Oscillator
Resiliency
PUF
pubcrawl
policy-based governance
Oscillators
logic obfuscation
Logic gates
composability
IP piracy
IP obfuscation
hardware obfuscation
FPGA IP obfuscation
FPGA based IP protection scheme
FPGA based designs
FPGA
field programmable gate arrays
Cryptography
biblio
Hardware Trojan Attacks: Threat Analysis and Countermeasures
Submitted by BrandonB on Wed, 05/06/2015 - 10:40am
information processing
Trojan tolerance
Trojan taxonomy
Trojan horses
Trojan detection
threat analysis
side-channel analysis
self-referencing
reactive protection approach
proactive protection approach
invasive software
integrated circuits
Integrated circuit modeling
Circuit faults
hardware Trojan attacks
hardware Trojan attack
hardware obfuscation
Hardware intellectual property (IP) trust
Hardware
global economic trend
fabrication
electronics industry
electronic hardware malicious modifications
computer system security
computer security