2019 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2019
DOI: 10.23919/date.2019.8714856
|View full text |Cite
|
Sign up to set email alerts
|

Design Obfuscation through Selective Post-Fabrication Transistor-Level Programming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…A recent trend in obfuscation research is the use of embedded FPGA (eFPGA) [21], [22]. A very similar approach is also found in [23], where authors perform obfuscation with transistor-level granularity. While there are advantages to this practice, it has been used selectively to only protect key portions of a design and therefore keep the performance penalty as low as possible.…”
Section: Comparison and Discussionmentioning
confidence: 88%
“…A recent trend in obfuscation research is the use of embedded FPGA (eFPGA) [21], [22]. A very similar approach is also found in [23], where authors perform obfuscation with transistor-level granularity. While there are advantages to this practice, it has been used selectively to only protect key portions of a design and therefore keep the performance penalty as low as possible.…”
Section: Comparison and Discussionmentioning
confidence: 88%
“…Locking techniques can be applied at all steps of the IC design flow. Post-synthesis techniques work at transistor [27] and netlist level [33]. Pre-synthesis techniques work at RTL [18] or HLS level [20,34].…”
Section: Related Workmentioning
confidence: 99%
“…A potentially un-trusted foundry manufactures the design without the programming information for the fabric (e.g., the configuration bit-stream) which the designer withholds. Fabrics include embedded field programmable gate arrays (eFPGAs) [4], [6], coarse-grained reconfigurable architectures [12], and transistor fabrics [13].…”
Section: Introductionmentioning
confidence: 99%