A hardware obfuscation technique for manufacturing a secure 3D IC.
Siroos MadaniMohammad R. MadaniIndira Kalyan DuttaYamini JoshiMagdy A. BayoumiPublished in: MWSCAS (2018)
Keyphrases
- hardware and software
- real time
- low cost
- manufacturing systems
- trusted computing
- hardware implementation
- quality control
- integrated circuit
- manufacturing processes
- image processing
- hardware architecture
- protection scheme
- static analysis
- security issues
- manufacturing industry
- security analysis
- security protocols
- application level
- computer systems
- vlsi implementation
- unauthorized access
- manufacturing companies
- previously mentioned
- cryptographic protocols
- hardware design
- computing power
- security requirements
- production planning
- personal computer
- embedded systems