نتایج جستجو برای: obfuscation

تعداد نتایج: 1527  

2016
S. Bhuvaneswari A. Hemamalini A. Anbarasan

For any semiconductor manufacturing requires greater capital investments, the use of contract foundries has grown dramatically, increasing exposure to theft and unauthorized excess production. Many recent activities proved that IC piracy has now become a major challenge for the electronics and defense industries. In this paper we presents a novel approach to design obfuscated circuits for digit...

Journal: :CoRR 2010
Babak Bashari Rad Maslin Masrom

In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obfuscation approaches. They transform their code in new instances as look entirely or partly different and contain dissimilar sequences of string, but their behavior and function remain unchanged. This obfuscation process allows ...

2017
Sangjun Ko Jusop Choi Hyoungshick Kim

There exist many plagiarism detection tools to uncover plagiarized codes by analyzing the similarity of source codes. To measure how reliable those plagiarism detection tools are, we developed a tool named Code ObfuscAtion Tool (COAT) that takes a program source code as input and produces another source code that is exactly equivalent to the input source code in their functional behaviors but w...

Journal: :IACR Cryptology ePrint Archive 2004
Ben Lynn Manoj Prabhakaran Amit Sahai

Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P ) with the same functionality as P , but such that O(P ) protects any secrets that may be built into and used by P . Program obfuscation, if possible, would have numerous important cryptographic applications, including: (1) “Intellectual property” protection of secret algorit...

Journal: :Proceedings on Privacy Enhancing Technologies 2015

Journal: :IEEE Transactions on Emerging Topics in Computing 2021

While financially advantageous, outsourcing key steps, such as testing, to potentially untrusted Outsourced Assembly and Test (OSAT) companies may pose a risk of compromising on-chip assets. Obfuscation scan chains is technique that hides the actual data from testers; logic inserted between cells, driven by secret key, transformation functions map scan-in stimulus (scan-out response) delivered ...

Journal: :Cryptography 2022

Key-based circuit obfuscation or logic-locking is a technique that can be used to hide the full design of an integrated from untrusted foundry end-user. The based on creating ambiguity in original by inserting “key” input bits into such unintelligible absent correct secret key. Clock signals have traditionally been avoided locking order not corrupt timing behavior locked circuit. In this paper,...

2012
ROGER ZAHNO Roger Zahno

Key Recovery From Decayed Memory Images and Obfuscation of Cryptographic Algorithms

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید