نتایج جستجو برای: ip piracy

تعداد نتایج: 42073  

Journal: :IEEE Access 2022

This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications. The proposed work offers security against altering register transfer level (RTL) description using multilevel as well IP piracy secret impression. In this approach, an invisible is covertly...

2015
Yu Bi Yier Jin Dhananjay S. Phatak

With the globalization of the integrated circuit (IC) design flow of chip fabrication, intellectual property (IP) piracy is becoming the main security threat. While most of the protection methods are dedicated for digital circuits, we are trying to protect radio-frequency (RF) designs. For the first time, we applied the split manufacturing method in RF circuit protection. Three different implem...

2014
mariateresa maggiolino Maria Lillà Montagnani Massimiliano Nuccio Mariateresa Maggiolino

Literature on online piracy has focused mainly on the legal framework necessary to prevent and punish copyright infringements on both the demand and supply sides. More recently, marketing and psychology studies have tried to understand the behavioral and ethical aspects connected with the consumption of pirated digital goods but little attention has been dedicated to the evolution in the distri...

Journal: :IEEE Transactions on Emerging Topics in Computing 2022

The era of widespread globalization has led to the emergence hardware-centric security threats throughout IC supply chain. Prior defenses like logic locking, layout camouflaging, and split manufacturing have been researched extensively protect against intellectual property (IP) piracy at different stages. In this work, we present dynamic camouflaging as a new technique thwart IP reverse enginee...

2010
Stevens Le Blond Arnaud Legout Fabrice Le Fessant Walid Dabbous

BitTorrent piracy is at the core of fierce debates around network neutrality. Most of the legal actions against BitTorrent exchanges are targeted toward torrent indexing sites and trackers. Surprisingly, little is known about the initial seeds that insert contents on BitTorrent and about the highly active peers that are present in a large number of torrents. The main reason is that acquiring th...

2014
M. MEENAKUMARI G. ATHISHA

In recent years, Intellectual Property (IP) cores in Very Large Scale Integration (VLSI) have become an active research area as it provides a new-fangled revolution in the Electronic Design Automation industry. An IP core is a previously designed and demonstrated component that can be integrated into design. Owing to the development of IP cores, time consumption becomes less and the product can...

Journal: :European Journal of Law and Technology 2012
Maria Ioanna Rantou

Online piracy is one of the most interesting, complex and topical issues relating to copyright today. It is engaging because it appeals to academics as much as it does to the general public, and it is as crucial for the governments as it is for the stakeholders involved. Moreover, from a legal perspective, it presents a multitude of interesting aspects to explore. This paper focuses on the spec...

Journal: :Microprocessors and Microsystems 2007
Javier Castillo Pablo Huerta José Ignacio Martínez

Nowadays there is a growing number of systems based on FPGAs spread over wide areas. When these kind of systems are used, serious security problems may appear. The configuration data for these devices can be very sensitive information that has to be protected against piracy and reverse engineering. In this paper, the main target is to describe a rapid prototyping platform that allows Secure IP ...

2015
Jooyeon Park Changsoo Sung

As the internet is largely used worldwide, it becomes critical to protect digital contents on the internet from illegal piracy. The purpose of this study is to explore the effect of online piracy deterrence methods punishment and education – on self-control and piracy intention. The gender differences on the relationship of piracy deterrence and intention is also examined. The result of this st...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید