Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"
DOI: 10.1109/tcad.2018.2887056
Abstract: Securing the intellectual property (IP) from counterfeiting is an important goal toward trustworthy computing. Camouflaging of logic gates is a well-known technique to prevent an adversary from de-layering the chip and stealing IP. In this…
read more here.
Keywords:
reverse engineering;
defined logic;
threshold voltage;
threshold defined ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Circuits and Systems II: Express Briefs"
DOI: 10.1109/tcsii.2020.2993447
Abstract: Reverse engineering reveals the physical structure as well as the functionality of an intellectual property (IP) and integrated circuit (IC). This opens the door for IP/IC piracy, counterfeiting, and malicious attacks such as Trojan insertions.…
read more here.
Keywords:
enhanced threshold;
threshold voltage;
defined logic;
family ... See more keywords