Blockchain-enabled Cryptographically-secure Hardware Obfuscation.
Fatemeh GanjiShahin TajikDomenic ForteJean-Pierre SeifertPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- low cost
- hardware and software
- real time
- reverse engineering
- hardware implementation
- unauthorized access
- lightweight
- computer systems
- trusted computing
- computing systems
- security requirements
- embedded systems
- protection schemes
- malware detection
- sensitive data
- previously mentioned
- high end
- hardware design
- circuit design
- security analysis
- massively parallel
- highly efficient
- data acquisition
- image processing
- information systems