Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP piracy
biblio
Design-Based Fingerprinting Using Side-Channel Power Analysis for Protection Against IC Piracy
Submitted by grigby1 on Thu, 07/30/2020 - 1:06pm
machine learning methods
integrated circuit modelling
integrated circuit testing
integrated circuits
Inverters
ip protection
IP/IC providers
learning (artificial intelligence)
Logic gates
machine learning
Integrated circuit modeling
Metrics
minimal design variations
modified netlist
pubcrawl
resilience
side-channel power analysis
supply chains
Trojan horses
fingerprinting scheme
policy-based governance
composability
IP piracy
Benchmark testing
circuit CAD
Computer crime
Cryptography
design-based fingerprinting
Fingerprinting
Resiliency
gate-level netlist changes
Hardware
Human behavior
Human Factors
IC design flow
IC piracy
industrial property
integrated circuit design
biblio
Programmable Daisychaining of Microelectrodes for IP Protection in MEDA Biochips
Submitted by grigby1 on Thu, 07/30/2020 - 12:53pm
ip protection
resilience
realistic MEDA biochips
real-life biomolecular protocols
pubcrawl
one-time-programmability
Microfluidics
microelectrodes
microelectrode-dot-array
Lab-on-a-Chip
Resiliency
Intellectual Property Protection
Digital Microfluidic Biochips
bioMEMS
biomedical electronics
biochemical protocols
IP piracy
composability
policy-based governance
biblio
Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection
Submitted by grigby1 on Wed, 02/26/2020 - 3:38pm
pubcrawl
logic locking method
malicious circuits
million-gate circuits
outsourcing
PCA-based HT detection methods
power analysis-based Trojan detection
power consumption
power consumption analysis
Power demand
principal component analysis
Process Variations
logic locking
resilience
security
semiconductor companies
small sub-circuit collection
supply chain security
Switches
system-on-chip
trojan horse detection
Trojan horses
untrustworthy fabs
hardware Trojan detection
policy-based governance
composability
IP piracy
circuit block extraction
circuit power
cyber physical systems
design for hardware trust
fabrication foundries
gate level
Hardware
Hardware Security
Resiliency
hardware Trojan threat
HT activity
HT power
HT-infected circuits
industrial property
integrated circuit layout
intellectual properties
invasive software
IPS
Logic gates
biblio
Provably-Secure Logic Locking: From Theory To Practice
Submitted by grigby1 on Tue, 01/23/2018 - 2:24pm
computer theory
trust
boolean satisfiability (sat)
collaboration
composability
design-for-trust
hardware trojan
IP piracy
logic locking
Policy
policy-based governance
pubcrawl
Resiliency
reverse engineering
biblio
Copyright Enforcement in the Digital Age: Empirical Evidence and Policy Implications
Submitted by grigby1 on Tue, 01/23/2018 - 2:24pm
collaboration
composability
IP piracy
Policy
policy-based governance
pubcrawl
Resiliency
biblio
What to Lock?: Functional and Parametric Locking
Submitted by grigby1 on Tue, 01/23/2018 - 2:24pm
pattern locks
boolean satisfiability
collaboration
composability
IP piracy
logic encryption
logic locking
Policy
policy-based governance
pubcrawl
Resiliency
reverse engineering
biblio
Evolution of logic locking
Submitted by grigby1 on Tue, 01/23/2018 - 2:24pm
collaboration
composability
integrated circuits
IP piracy
Logic gates
manufacturing
Policy
policy-based governance
pubcrawl
Resiliency
reverse engineering
side-channel attacks
supply chains
biblio
MUTARCH: Architectural diversity for FPGA device and IP security
Submitted by grigby1 on Tue, 01/23/2018 - 2:24pm
policy-based governance
IP security
logical configuration keys
logic circuits
microprocessor chips
modern remote upgrade techniques
MUTARCH
physical configuration keys
Policy
IP piracy
pubcrawl
Resiliency
security through diversity principle
static keys
Table lookup
time-varying keys
Transforms
unauthorized in-field reprogramming
field programmable gate arrays
automotive systems
biomedical systems
bitstream encryption
collaboration
composability
configuration file
diverse applications
encryption
architectural diversity
FPGA device
Hardware
in-field reconfiguration
intellectual property blocks
Internet of Things
IoT
IP blocks
biblio
TTLock: Tenacious and traceless logic locking
Submitted by grigby1 on Tue, 01/23/2018 - 2:24pm
IP piracy
TTLock
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
Policy
logic locking
IP piracy revention
collaboration
Interference
intellectual property protection technique
intellectual property
industrial property
Foundries
computer science
Computers
Computer crime
composability
biblio
Identifying Reversible Circuit Synthesis Approaches to Enable IP Piracy Attacks
Submitted by grigby1 on Tue, 01/23/2018 - 2:24pm
Logic gates
Training data
TBS
Support vector machines
security
Reversible logic
reversible circuit synthesis approaches
Resiliency
QMDD
pubcrawl
policy-based governance
Policy
network synthesis
machine learning algorithms
machine learning
BDD
logic design
logic circuits
learning (artificial intelligence)
IP piracy attacks
IP piracy
Interference
integrated circuit piracy
Integrated circuit modeling
industrial property
ESOP
embedded function
composability
collaboration
« first
‹ previous
1
2
3
4
next ›
last »