On the Difficulty of FSM-based Hardware Obfuscation.
Marc FyrbiakSebastian WallatJonathan DéchelotteNils AlbartusSinan BöckerRussell TessierChristof PaarPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- low cost
- finite state machines
- real time
- hardware and software
- hardware implementation
- standard pc
- massively parallel
- computer systems
- data acquisition
- reverse engineering
- static analysis
- computing power
- vlsi implementation
- computational power
- parallel hardware
- hardware software
- data transformation
- control flow
- data management
- data flow
- data processing