Ephemeral Key-based Hybrid Hardware Obfuscation

被引:0
|
作者
Nasir, Neelam [1 ]
Ali Malik, Arsalan [1 ]
Tahir, Ifra [1 ]
Masood, Ammar [1 ]
Riaz, Naveed [1 ]
机构
[1] National Center for Cyber Security (NCCS), Air University, Islamabad,44000, Pakistan
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Computer circuits - Intellectual property - Locks (fasteners) - Malware - Reverse engineering - Supply chains
引用
收藏
页码:646 / 652
相关论文
共 50 条
  • [21] Key-Based Scrambling for Secure Image Communication
    Premaratne, Prashan
    Premaratne, Malin
    EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, 2012, 304 : 259 - +
  • [22] Symmetric key-based authenticated encryption protocol
    Bhuva, Milap J.
    Singh, Sanjay
    INFORMATION SECURITY JOURNAL, 2019, 28 (1-2): : 35 - 45
  • [23] ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
    Rahman, M. Sazadur
    Guo, Rui
    Kamali, Hadi M.
    Rahman, Fahim
    Farahmandi, Farimah
    Tehranipoor, Mark
    IEEE ACCESS, 2023, 11 : 19741 - 19761
  • [24] A Dual Key-Based Activation Scheme for Secure LoRaWAN
    Kim, Jaehyu
    Song, JooSeok
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017,
  • [25] Evaluation of Key-Based Physical Layer Security Systems
    Nazzal, T.
    Mukhtar, H.
    2021 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INFORMATION SECURITY (ICSPIS), 2021,
  • [26] Binary arithmetic coding with key-based interval splitting
    Wen, JT
    Kim, H
    Villasenor, JD
    IEEE SIGNAL PROCESSING LETTERS, 2006, 13 (02) : 69 - 72
  • [27] Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques
    Thejaswini, P.
    Vivekananda, G.
    Anu, H.
    Priya, R.
    Prasad, B. S. Krishna
    Nischay, M.
    EMITTER-INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGY, 2022, 10 (02) : 370 - 388
  • [28] Hardware Obfuscation using PUF-based Logic
    Wendt, James B.
    Potkonjak, Miodrag
    2014 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2014, : 270 - 277
  • [29] A mathematical programming approach to key-based election analysis
    Dietz, Dennis C.
    OPERATIONS RESEARCH LETTERS, 2006, 34 (04) : 405 - 411
  • [30] A quantum key-based mobile security payment scheme
    Zhu D.
    Li X.
    Wu J.
    Song L.
    International Journal of Performability Engineering, 2019, 15 (08) : 2165 - 2172