Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trojan insertion
biblio
Enhanced Functional Obfuscation of DSP core using Flip-Flops and Combinational logic
Submitted by aekwall on Mon, 11/09/2020 - 12:40pm
block logic
Trojan insertion
IP core locking block logic
Intellectual Property cores
Integrated Circuit design flow
ILB
hardware threats
functionally obfuscated design
functional obfuscation based security mechanism
functional obfuscation
flip-flops
flip-flop
DSP design
digital signal processing core
consumer electronics systems
combinational logic
Cryptography
IP core
IC design flow
IP piracy
Consumer electronics
combinational circuits
DSP
logic design
DSP core
digital signal processing chips
industrial property
policy-based governance
composability
pubcrawl
Resiliency
biblio
A Novel Logical Locking Technique Against Key-Guessing Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
Observability
intellectual property piracy
ISCAS'85 benchmark circuits
key guessing attacks
Key-gates
key-guessing attacks
logical locking
logical locking technique
logically locked design
intellectual property
path sensitization attacks
Secret key
secured hardware
secured locking mechanism
system analysis and design
Testability measures
Trojan insertion
brute force attacks
integrated circuits
Hardware
private key cryptography
Hamming distance
pubcrawl
collaboration
Computer crime
Human Factors
policy-based governance
invasive software
added logics
Brute Force Attack
embedded computing
hardware attacks
hill climbing attack
illegal integrated circuit overproduction
industrial property
biblio
Special Session: Countering IP Security Threats in Supply Chain
Submitted by grigby1 on Thu, 03/12/2020 - 11:09am
Monitoring
Valves
Trojan insertion
Training
telecommunication security
tagging
supply chain security
supply chain management
Supply Chain
Scalability
reverse engineering
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
Data models
machine learning
logic locking schemes
logic design
learning-based trust verification
learning (artificial intelligence)
IP security threats
invasive software
internet
integrated circuits
integrated circuit technology
integrated circuit manufacture
integrated circuit fabrication
integrated circuit design
Human behavior
electronic engineering computing