2010
DOI: 10.1109/mdt.2010.24
|View full text |Cite
|
Sign up to set email alerts
|

Preventing IC Piracy Using Reconfigurable Logic Barriers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
95
0
1

Year Published

2011
2011
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 278 publications
(99 citation statements)
references
References 8 publications
0
95
0
1
Order By: Relevance
“…The insertion is achieved at randomly selected locations before physical synthesis but after logic synthesis. Similarly, Baumgarten et al [21] used lookup table-based locking units that hinder attempts to reverse-engineer functionality from the mask prospectives. It demonstrates how logic encryption can be propagated to the field programmable gate array (FPGA) domain.…”
Section: Prior Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The insertion is achieved at randomly selected locations before physical synthesis but after logic synthesis. Similarly, Baumgarten et al [21] used lookup table-based locking units that hinder attempts to reverse-engineer functionality from the mask prospectives. It demonstrates how logic encryption can be propagated to the field programmable gate array (FPGA) domain.…”
Section: Prior Workmentioning
confidence: 99%
“…To evaluate the security of logic locking, a Hamming distance based metric is mostly applied in [18,[20][21][22]. Figure 6 shows the Hamming distance analysis of ISCAS'85 benchmark circuits using our proposed algorithm.…”
Section: Security Evaluationmentioning
confidence: 99%
“…Efficient insertion of the masking scheme has to be achieved without reducing performance (mainly by limiting the insertion of gates on the critical path) or increasing area overhead (by limiting the number of additional gates without using too few bits for the masking key k). For example, works presented in [15] and [4] propose to use heuristics to reduce overhead.…”
Section: Logic Maskingmentioning
confidence: 99%
“…В работе [19] предлагается защита от аппарат-ных троянов, которая вносится на стадии изготов-ления. Если размещать реконфигурируемые логи-ческие блоки меж ду важнейшими элементами в проек те, то на производственной стадии будет видима некоторая реконфигурируемая архитек-тура в некоторых областях кристалла.…”
Section: Reconfigurable Architectureunclassified
“…In [19] the protection against hardware Trojans at the manufacturing stage is proposed. If to place a reconfigurable logic blocks between critical elements in the project, then some reconfigurable architecture in some areas of the chip is visible at the production stage.…”
Section: #2 / 72 / 2017mentioning
confidence: 99%