نتایج جستجو برای: IP Piracy

تعداد نتایج: 42073  

Journal: :isecure, the isc international journal of information security 0
sh. zamanzadeh computer science and engineering department, shahid beheshti university, tehran, iran a. jahanian computer science and engineering department, shahid beheshti university, tehran, iran

fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. in untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious trojans. understanding the netlist topology is the ultimate goal of the reverse engineering process. in this paper, we propose...

2015
Yu Bi

With the globalization of integrated circuit (IC) design flow and the outsourcing of chip fabrication service, intellectual property (IP) piracy and malicious logic insertion become main security threats to tamper hardware infrastructures. While most of the protection methods are dedicated for digital circuits, we try to protect radio-frequency (RF) designs which are more likely to be IP piracy...

Journal: :CoRR 2015
Anirudh Iyengar Swaroop Ghosh

Semiconductor supply chain is increasingly getting exposed to variety of security attacks such as Trojan insertion, cloning, counterfeiting, reverse engineering (RE), piracy of Intellectual Property (IP) or Integrated Circuit (IC) and side-channel analysis due to involvement of untrusted parties. In this paper, we propose transistor threshold voltage-defined switches to camouflage the logic gat...

2014
Jeebananda Panda Ankur Bharadwaj Neeta Pandey Asok Bhattacharyya

Intellectual Property Protection (IPP) is very important for a design created by IP owner. For this, IP owner embeds watermark in its design. One such type of technique is suggested by Oliviera, in which modification of State Transition Graph (STG) of a digital circuit takes place in such a way that it is not possible for the intruder to find that there is a watermark embedded in the circuit. I...

Journal: :IEEE Access 2016
Anirban Sengupta Saraju P. Mohanty Fabrizio Lombardi Mark Zwolinski

It is a well-known fact that design productivity is failing to keep pace with the big increase in the demands of applications and advanced silicon technology, especially in the domain of portable electronics. Moreover owing to the massive complexity of modern systems-on-chip (SoC), complete in-house development is impossible, and thus globalization of the design process has established itself a...

2009
Dexin Tian Chin-Chung Chao

* The authors would like to thank wholeheartedly the editor and the anonymous referees for their insightful comments and great help with the publication of this paper. Abstract Through a thematic analysis of 45 in-depth interviews via the theoretical frameworks of the theory of reasoned action and culture change, this study explores the grass roots voices concerning Chinese copyright piracy of ...

2010

This study explores the interaction between innovations and financial markets using newly available data of China that present significant geographic variations in economic development. Empirical evidence suggests that provincial banking development encourages local innovations, and provincial intellectual property (IP) protection raises the market values of local firms. Firmlevel innovations l...

Journal: :CoRR 2015
Manuel G. Chávez-Angeles Patricia S. Sánchez-Medina

In many developing countries intellectual property infringement and the commerce of pirate goods is an entrepreneurial activity. Digital piracy is very often the only media for having access to music, cinema, books and software. At the same time, bio-prospecting and infringement of indigenous knowledge rights by international consortiums is usual in places with high biodiversity. In these arena...

Journal: :IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2022

The design and manufacturing steps of a chip typically involve several parties. For example, may comprise third-party intellectual property (IP) cores the integrated circuit (IC) fabrication be outsourced to foundry. IP ICs are shared with potentially untrusted third parties and, as result, subject piracy attacks. Even more, any legally purchased reverse engineered retrieve down transistor leve...

2017
Samah Mohamed Saeed Nithin Mahendran Alwin Zulehner Robert Wille Ramesh Karri

Reversible circuits are vulnerable to intellectual property and integrated circuit piracy. To show these vulnerabilities, a detailed understanding on how to identify the function embedded in a reversible circuit is crucial. To obtain the embedded function, one needs to know the synthesis approach used to generate the reversible circuit in the first place. We present a machine learning based sch...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید