Guest Editorial: Hardware Reverse Engineering and Obfuscation

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Guest Editorial: Special Issue on Collaborative Engineering

Design of complex engineering systems is increasingly becoming a collaborative task among designers or design teams that are physically, geographically, and temporally distributed. The complexity of modern products means that a single designer or design team can no longer manage the complete product development effort. Developing products without sufficient expertise in a broad set of disciplin...

متن کامل

Guest Editorial Special Section on Hardware Security and Trust

Creating backdoors in integrated circuits (ICs), stealing hardware intellectual property, counterfeiting electronic components , reverse engineering ICs, and injecting malware in ICs are no longer nation state acts requiring specialized, expensive , and unlimited resources. Democratization of IC design has created numerous opportunities for rogues throughout the IC supply chain to inflict these...

متن کامل

Guest Editorial Deep Packet Inspection: Algorithms, Hardware, and Applications

D EEP packet inspection (DPI) examines the content in packet payloads to search for signatures of network applications, signs of malicious activities, and leaks of sensitive information, rather than just examine packet headers for information such as IP addresses and port numbers. The inspection provides network devices with rich information of application protocol messages in packet payloads, ...

متن کامل

ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

متن کامل

Code Obfuscation against Static and Dynamic Reverse Engineering

The process of reverse engineering allows attackers to understand the behavior of software and extract proprietary algorithms and data structures (e.g. cryptographic keys) from it. Code obfuscation is frequently employed to mitigate this risk. However, while most of today’s obfuscation methods are targeted against static reverse engineering, where the attacker analyzes the code without actually...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Hardware and Systems Security

سال: 2018

ISSN: 2509-3428,2509-3436

DOI: 10.1007/s41635-018-0059-9