Comparative Analysis of Hardware Obfuscation for IP Protection.
Sarah AmirBicky ShakyaDomenic ForteMark M. TehranipoorSwarup BhuniaPublished in: ACM Great Lakes Symposium on VLSI (2017)
Keyphrases
- comparative analysis
- protection scheme
- low cost
- real time
- hardware and software
- reverse engineering
- computer systems
- protection schemes
- semi quantitative
- ip networks
- static analysis
- fusion scheme
- data acquisition
- hardware implementation
- computing systems
- privacy protection
- information security
- image processing
- personal computer
- embedded systems
- massively parallel
- control flow
- hardware architecture
- data protection
- vlsi implementation
- source code