2017 18th IEEE Latin American Test Symposium (LATS) 2017
DOI: 10.1109/latw.2017.7906738
|View full text |Cite
|
Sign up to set email alerts
|

Efficient behavioral intellectual properties source code obfuscation for high-level synthesis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…To achieve this, we rely on key-based obfuscation techniques. However, the methods presented in [11] are compatible with our approach, which means that both can be jointly used to increase the level of protection.…”
Section: A Ip Protectionmentioning
confidence: 89%
See 1 more Smart Citation
“…To achieve this, we rely on key-based obfuscation techniques. However, the methods presented in [11] are compatible with our approach, which means that both can be jointly used to increase the level of protection.…”
Section: A Ip Protectionmentioning
confidence: 89%
“…In [11], a heuristic approach for optimal obfuscation of behavioral IPs is presented. It is based on a study of the impact of commercial or free software obfuscators on HLS quality of results.…”
Section: A Ip Protectionmentioning
confidence: 99%
“…While logic locking has been mostly applied at the gate level [11], there is a growing interest for raising the abstraction level to RTL or even more the previous stages. In these cases, this process is usually called behavioral locking and can be applied to the high-level specification (e.g., C/C++) [12], [13], during the HLS (even though it may require tool changes) [14], [15], or on the RTL descriptions [16]. In all cases, it is possible to protect more semantic information (e.g., proprietary constants, arithmetic operations, control flow) and use industrial EDA flows for chip design [17].…”
Section: B Locking Lockingmentioning
confidence: 99%
“…Also, the impact of optimization passes is application dependent. Software obfuscation techniques applied to source code can negatively affect HLS quality of results [15].…”
Section: Introductionmentioning
confidence: 99%