Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification

P Bagul, V Inamdar - International Journal of Reconfigurable …, 2023 - Wiley Online Library
As the reuse of IP cores or the development of frequently used hardware modules is gaining
more attention in the semiconductor industry, the misappropriation of the owner's identity is a …

MeMin: SAT-based exact minimization of incompletely specified Mealy machines

A Abel, J Reineke - 2015 IEEE/ACM International Conference …, 2015 - ieeexplore.ieee.org
In this paper, we take a fresh look at a well-known NP-complete problem-the exact
minimization of incompletely specified Mealy machines. Most existing exact techniques in …

Hausdorff distance model-based identity authentication for IP circuits in service-centric internet-of-things environment

W Liang, W Huang, W Chen, KC Li, K Li - Sensors, 2019 - mdpi.com
Rapid advances in the Internet-of-Things (IoT) have exposed the underlying hardware
devices to security threats. As the major component of hardware devices, the integrated …

Automatic generation of models of microarchitectures

A Abel - 2020 - publikationen.sulb.uni-saarland.de
Detailed microarchitectural models are necessary to predict, explain, or optimize the
performance of software running on modern microprocessors. Building such models often …

A novel identity authentication for FPGA based IP designs

Y Huang, W Liang, J Long, J Xu… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
With the rapid development of Internet-of-Things (IoT), hardware security becomes an
important issue. Once a chip is attacked, the authentication always faces serious credibility …

IP-cores watermarking scheme at behavioral level using genetic algorithms

J Echavarria, A Morales-Reyes, R Cumplido… - … Applications of Artificial …, 2021 - Elsevier
This paper presents an improved watermarking scheme for soft Intellectual Property (IP)-
Cores using Genetic Algorithms (GAs). For this purpose, a watermark signature and an IP …

A Darwinian genetic algorithm for state encoding based finite state machine watermarking

M Lewandowski, S Katkoori - 20th International Symposium on …, 2019 - ieeexplore.ieee.org
We propose an extended Darwinian Genetic Algorithm that builds upon the traditional
genetic algorithm in the efforts to more accurately depict the process of natural selection We …

[图书][B] Secure VLSI Hardware Design against Intellectual Property (IP) Theft and Cryptographic Vulnerabilities

MD Lewandowski - 2021 - search.proquest.com
Over the last two decades or so, VLSI hardware is increasingly subject to sophisticated
attacks on both the supply chain and design fronts. There is no explicit trust that the …

Implementation-based design fingerprinting for robust IC fraud detection

J Shey, N Karimi, R Robucci, C Patel - Journal of Hardware and Systems …, 2019 - Springer
With the global spanning of integrated circuit (IC) and electronic device supply chains, the
ability of an untrusted foundry to alter a design for intellectual property (IP)/IC piracy …

[PDF][PDF] A Novel Identity Authentication for FPGA based IP Designs

WL Yin Huang, J Long, J Xu, KC Li - researchgate.net
(IoT), hardware security becomes an important issue. Once a chip is attacked, the
authentication always faces serious credibility crisis. In this work, a Hausdorff distance …