Obfuscation of combination circuits of digital devices from unauthorized access
The problems of designing modern VLSI and SoC are analyzed. The most difficult problems of design are problems of verification of projects at different stages of design. Along with the problems that arise and are solved in the mode of favorable design, in the last decade there was a problem of prote...
Saved in:
Main Author: | L. A. Zolotorevich |
---|---|
Format: | Article |
Language: | Russian |
Published: |
National Academy of Sciences of Belarus, the United Institute of Informatics Problems
2019-09-01
|
Series: | Informatika |
Subjects: | |
Online Access: | https://inf.grid.by/jour/article/view/730 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Review of path branch obfuscation
by: Pu GENG, et al.
Published: (2020-04-01) -
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, et al.
Published: (2022-12-01) -
DNNobfus: a study on obfuscation-based edge-side model protection framework
by: SONG Feiyang, et al.
Published: (2024-04-01) -
An obfuscate implementation for Android resources index table
by: Yang LIU, et al.
Published: (2016-10-01) -
Research on construction of conditional exception code used in branch obfuscation
by: Pu GENG, et al.
Published: (2020-12-01)