Guest Editorial: Hardware Reverse Engineering and Obfuscation
نویسندگان
چکیده
منابع مشابه
Guest Editorial: Special Issue on Collaborative Engineering
Design of complex engineering systems is increasingly becoming a collaborative task among designers or design teams that are physically, geographically, and temporally distributed. The complexity of modern products means that a single designer or design team can no longer manage the complete product development effort. Developing products without sufficient expertise in a broad set of disciplin...
متن کاملGuest Editorial Special Section on Hardware Security and Trust
Creating backdoors in integrated circuits (ICs), stealing hardware intellectual property, counterfeiting electronic components , reverse engineering ICs, and injecting malware in ICs are no longer nation state acts requiring specialized, expensive , and unlimited resources. Democratization of IC design has created numerous opportunities for rogues throughout the IC supply chain to inflict these...
متن کاملGuest Editorial Deep Packet Inspection: Algorithms, Hardware, and Applications
D EEP packet inspection (DPI) examines the content in packet payloads to search for signatures of network applications, signs of malicious activities, and leaks of sensitive information, rather than just examine packet headers for information such as IP addresses and port numbers. The inspection provides network devices with rich information of application protocol messages in packet payloads, ...
متن کاملASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...
متن کاملCode Obfuscation against Static and Dynamic Reverse Engineering
The process of reverse engineering allows attackers to understand the behavior of software and extract proprietary algorithms and data structures (e.g. cryptographic keys) from it. Code obfuscation is frequently employed to mitigate this risk. However, while most of today’s obfuscation methods are targeted against static reverse engineering, where the attacker analyzes the code without actually...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Hardware and Systems Security
سال: 2018
ISSN: 2509-3428,2509-3436
DOI: 10.1007/s41635-018-0059-9