메뉴 건너뛰기




Volumn 28, Issue 1, 2009, Pages 1493-1502

HARPOON: An obfuscation-based SoC design methodology for hardware protection

Author keywords

Design for security; Hardware authentication; Hardware obfuscation; Intellectual property (IP) piracy; IP protection

Indexed keywords

BENCHMARK CIRCUIT; DELAY CONSTRAINTS; HARDWARE IP; HARDWARE PROTECTION; INTEGRAL PART; IP CORE; IP PROTECTION; IP VENDORS; MANUFACTURING FLOW; NETLIST; NOVEL DESIGN METHODOLOGY; POWER OVERHEAD; SECURITY HARDWARE; SIMULATION RESULT; SOC DESIGNS; SYSTEM ON CHIP DESIGN;

EID: 77955216190     PISSN: 02780070     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (73)

References (20)
  • 4
    • 57849162166 scopus 로고    scopus 로고
    • Protecting and exploiting intellectual property in electronics
    • [Online]. Available
    • D. C. Musker, "Protecting and exploiting intellectual property in electronics," in Proc. IBC Conf., 1998. [Online]. Available: http://www.jenkins.eu/articles/reverse-engineering.asp
    • (1998) Proc. IBC Conf.
    • Musker, D.C.1
  • 9
    • 70349736810 scopus 로고    scopus 로고
    • [Online]. Available
    • Xilinx IP Evaluation. [Online]. Available: http://www.xilinx.com/ ipcenter/ipevaluation/index.htm
    • Xilinx IP Evaluation
  • 11
    • 49749144533 scopus 로고    scopus 로고
    • Remote activation of ICs for piracy prevention and digital right management
    • Y. Alkabani, F. Koushanfar, and M. Potkonjak, "Remote activation of ICs for piracy prevention and digital right management," in Proc. Int. Conf. CAD, 2007, pp. 674-677.
    • (2007) Proc. Int. Conf. CAD , pp. 674-677
    • Alkabani, Y.1    Koushanfar, F.2    Potkonjak, M.3
  • 13
    • 77955188491 scopus 로고    scopus 로고
    • [Online]. Available
    • Designware USB Solutions. [Online]. Available: http://www.synopsys.com/ products/designware/usb-solutions.html
    • Designware USB Solutions
  • 14
    • 57849152428 scopus 로고    scopus 로고
    • Hardware protection and authentication through netlist level obfuscation
    • R. S. Chakraborty and S. Bhunia, "Hardware protection and authentication through netlist level obfuscation," in Proc. Int. Conf. CAD, 2008, pp. 674-677.
    • (2008) Proc. Int. Conf. CAD , pp. 674-677
    • Chakraborty, R.S.1    Bhunia, S.2
  • 15
    • 21244465901 scopus 로고    scopus 로고
    • Formal verification of timed systems: A survey and perspective
    • Aug.
    • F. Wang, "Formal verification of timed systems: A survey and perspective," Proc. IEEE, vol. 92, no. 8, pp. 1283-1305, Aug. 2004.
    • (2004) Proc. IEEE , vol.92 , Issue.8 , pp. 1283-1305
    • Wang, F.1
  • 17
    • 84884389027 scopus 로고    scopus 로고
    • [Online]. Available
    • The ISCAS-89 Benchmark Circuits. [Online]. Available: http://www.pld.ttu.ee/~maksim/benchmarks/iscas89/verilog/
    • The ISCAS-89 Benchmark Circuits
  • 20
    • 0032316912 scopus 로고    scopus 로고
    • Undetectable fault removal of sequential circuits based on unreachable states
    • H. Yotsuyanagi and K. Kinoshita, "Undetectable fault removal of sequential circuits based on unreachable states," in Proc. VLSI Test Symp., 1998, pp. 176-181.
    • (1998) Proc. VLSI Test Symp. , pp. 176-181
    • Yotsuyanagi, H.1    Kinoshita, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.