Academic literature on the topic 'Logic Obfuscation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Logic Obfuscation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Logic Obfuscation"

1

Park, Beomsoo, and Nima Maghari. "Logic Obfuscation Through Enhanced Threshold Voltage Defined Logic Family." IEEE Transactions on Circuits and Systems II: Express Briefs 67, no. 12 (2020): 3407–11. http://dx.doi.org/10.1109/tcsii.2020.2993447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

LIU, Liang, Jiacheng ZHU, Zhe ZHANG, Lixiang SHEN, Yufeng SUN, and Dejun MU. "A logic obfuscation attack method based on gate-level information flow tracing techniques." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 42, no. 1 (2024): 78–83. http://dx.doi.org/10.1051/jnwpu/20244210078.

Full text
Abstract:
Logical obfuscation technique is a mainstream technical means to achieve intellectual property protection and prevent reverse engineering. In this paper, we propose a logical obfuscation attack method based on the gate-level information flow tracking technique, using the information flow analysis method at the gate-level abstraction level, establishing an information flow model, constraining the output and its contamination labels, and solving the obfuscation key sequence satisfying the constraints using an SAT solver. The experimental results show that the attack method has good cracking effe
APA, Harvard, Vancouver, ISO, and other styles
3

Thursday Ehis, Akhigbe-mudu. "Analytical Framework of Cloud Homomorphic Encryption / Cryptographic Logic Obfuscation for Cyber Health Hygiene." Journal of Technology Innovations and Energy 1, no. 2 (2022): 28–38. http://dx.doi.org/10.56556/jtie.v1i2.134.

Full text
Abstract:
Hacking and the resulting disaster have become so dangerous that developers and organizations are taking extra precautions to reduce their incidence and impact. A drift is any gap between the code and the cloud. Ad hoc adjustments can, of course, result in environment instability, deployment challenges, unpredictably high costs, and security or compliance gaps. The risk of configuration drift becoming a permanent fixture is one of the most important considerations on this study. One such strategic strategy to mitigate these behaviors and render it unavailable to tracking, interpretation, and u
APA, Harvard, Vancouver, ISO, and other styles
4

Akhigbe-mudu, Thursday Ehis. "Analytical Framework of Cloud Homomorphic Encryption / Cryptographic Logic Obfuscation for Cyber Health Hygiene." Journal of Technology Innovations and Energy 1, no. 2 (2022): 28–38. https://doi.org/10.5281/zenodo.6839004.

Full text
Abstract:
Hacking and the resulting disaster have become so dangerous that developers and organizations are taking extra precautions to reduce their incidence and impact. A drift is any gap between the code and the cloud. Ad hoc adjustments can, of course, result in environment instability, deployment challenges, unpredictably high costs, and security or compliance gaps. The risk of configuration drift becoming a permanent fixture is one of the most important considerations on this study. One such strategic strategy to mitigate these behaviors and render it unavailable to tracking, interpretation, and u
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Jiliang. "A Practical Logic Obfuscation Technique for Hardware Security." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24, no. 3 (2016): 1193–97. http://dx.doi.org/10.1109/tvlsi.2015.2437996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hoque, Tamzidul, Rajat Subhra Chakraborty, and Swarup Bhunia. "Hardware Obfuscation and Logic Locking: A Tutorial Introduction." IEEE Design & Test 37, no. 3 (2020): 59–77. http://dx.doi.org/10.1109/mdat.2020.2984224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lilly, Carol S. "Amoral Realism or Immoral Obfuscation?" Slavic Review 55, no. 4 (1996): 749–54. http://dx.doi.org/10.2307/2501234.

Full text
Abstract:
In his article, "Schindler's Fate: Genocide, Ethnic Cleansing, and Population Transfers," Robert Hayden combines comparative history, political commentary, and amoral realism. In the process, he presents a number of arguments with which it is difficult to disagree, but also many that are provocative and, indeed, offensive. Because Hayden makes so many arguments in this piece (both primary, secondary, and parenthetical; explicit and implicit; open and disguised) my critique will not follow the organization of his paper. Rather, it will challenge Hayden's article on three counts: 1) its factual
APA, Harvard, Vancouver, ISO, and other styles
8

Topaloglu, Rasit Onur. "Quantum Logic Locking for Security." J 6, no. 3 (2023): 411–20. http://dx.doi.org/10.3390/j6030027.

Full text
Abstract:
Having access to a unique quantum circuit that one wants to protect against use by others is a very likely scenario in industrial computing. However, currently, users rely on classical computer security schemes, which have known shortcomings. In this paper, we introduce a novel protection scheme along with a survey of other known methods to protect quantum information. In particular, we review physically unclonable functions (PUFs), obfuscation, and introduce quantum logic locking (QLL). The latter technique provisions end users to protect their circuit from an adversary through the use of a s
APA, Harvard, Vancouver, ISO, and other styles
9

Shamsi, Kaveh, Meng Li, Kenneth Plaks, Saverio Fazzari, David Z. Pan, and Yier Jin. "IP Protection and Supply Chain Security through Logic Obfuscation." ACM Transactions on Design Automation of Electronic Systems 24, no. 6 (2019): 1–36. http://dx.doi.org/10.1145/3342099.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mirmohammadi, Zahra, and Shahram Etemadi Borujeni. "A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking." Electronics 12, no. 5 (2023): 1107. http://dx.doi.org/10.3390/electronics12051107.

Full text
Abstract:
Effective resistance to intellectual property theft, reverse engineering, and hardware Trojan insertion in integrated circuit supply chains is increasingly essential, for which many solutions have been proposed. Accordingly, strong attacks are also designed in this field. One way to achieve the above goal is obfuscation. The hardware obfuscation method hides the primary function of the circuit and the normal Netlist from the attacker by adding several key gates in the original Netlist. The functionality circuit is correct only if the correct key is applied; otherwise, the circuit is obfuscated
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Logic Obfuscation"

1

Lu, Weiyun. "Formally Verified Code Obfuscation in the Coq Proof Assistant." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39994.

Full text
Abstract:
Code obfuscation is a software security technique where transformations are applied to source and/or machine code to make them more difficult to analyze and understand to deter reverse-engineering and tampering. However, in many commercial tools, such as Irdeto's Cloakware product, it is not clear why the end user should believe that the programs that come out the other end are still the same program"! In this thesis, we apply techniques of formal specification and verification, by using the Coq Proof Assistant and IMP (a simple imperative language within it), to formulate what it mean
APA, Harvard, Vancouver, ISO, and other styles
2

Chakraborty, Rajat Subhra. "Hardware Security through Design Obfuscation." Cleveland, Ohio : Case Western Reserve University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1270133481.

Full text
Abstract:
Thesis (Doctor of Philosophy)--Case Western Reserve University, 2010<br>Department of EECS - Computer Engineering Title from PDF (viewed on 2010-05-25) Includes abstract Includes bibliographical references and appendices Available online via the OhioLINK ETD Center
APA, Harvard, Vancouver, ISO, and other styles
3

Taylor, Christopher P. "A Security Framework for Logic Locking Through Local and Global Structural Analysis." The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1587681912604658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Godfroy, Hubert. "Réflexion, calculs et logiques." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0130/document.

Full text
Abstract:
Le but de cette thèse est de trouver des modèles de haut niveau dans lesquelles l'auto-modification s'exprime facilement. Une donnée est lisible et modifiable, alors qu'un programme est exécutable. On décrit une machine abstraite où cette dualité est structurellement mise en valeur. D'une part une zone de programmes contient tous les registres exécutables, et d'autre part une zone de données contient les registres lisibles et exécutables. L'auto-modification est permise par le passage d'un registre d'une zone à l'autre. Dans ce cadre, on donne une abstraction de l'exécution de la machine qui e
APA, Harvard, Vancouver, ISO, and other styles
5

Godfroy, Hubert. "Réflexion, calculs et logiques." Electronic Thesis or Diss., Université de Lorraine, 2017. http://www.theses.fr/2017LORR0130.

Full text
Abstract:
Le but de cette thèse est de trouver des modèles de haut niveau dans lesquelles l'auto-modification s'exprime facilement. Une donnée est lisible et modifiable, alors qu'un programme est exécutable. On décrit une machine abstraite où cette dualité est structurellement mise en valeur. D'une part une zone de programmes contient tous les registres exécutables, et d'autre part une zone de données contient les registres lisibles et exécutables. L'auto-modification est permise par le passage d'un registre d'une zone à l'autre. Dans ce cadre, on donne une abstraction de l'exécution de la machine qui e
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Logic Obfuscation"

1

McCabe, Joshua T. American Exceptionalism Revisited. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190841300.003.0001.

Full text
Abstract:
Chapter 1 challenges the conventional wisdom on American exceptionalism in regard to tax and social policy. After setting up the puzzle and outlining why previous theories cannot explain them, it lays out the book’s main arguments in detail. First, it outlines the book’s theory of fiscalization as an obfuscation strategy. Second, it outlines a new theory of the cultural legacies of public policies. It is not, as most scholars argue, the legacy of the Poor Law that explains America’s exceptional tax credits but rather the absence of a legacy of family allowances. It argues that “logics of appro
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Logic Obfuscation"

1

Rajendran, Jeyavijayan, and Siddharth Garg. "Logic Encryption." In Hardware Protection through Obfuscation. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49019-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rahman, Md Moshiur, and Swarup Bhunia. "Hardware Obfuscation and Logic Locking." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1646-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rahman, Md Moshiur, and Swarup Bhunia. "Hardware Obfuscation and Logic Locking." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saha, Akashdeep, Hrivu Banerjee, Rajat Subhra Chakraborty, and Debdeep Mukhopadhyay. "Revisiting Logic Obfuscation Using Cellular Automata." In Advances in Intelligent Systems and Computing. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0542-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Yi-Chung, Yandan Wang, Wei Zhang, Yiran Chen, and Hai (Helen) Li. "In-place Logic Obfuscation for Emerging Nonvolatile FPGAs." In Fundamentals of IP and SoC Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50057-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abideen, Zain Ul, and Samuel Pagliarini. "ReBO-Driven IC Design: Leveraging Reconfigurable Logic for Obfuscation." In Synthesis Lectures on Digital Circuits & Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-77509-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mohankumar, N., M. Jayakumar, and M. Nirmala Devi. "Lightweight Logic Obfuscation in Combinational Circuits for Improved Security—An Analysis." In Expert Clouds and Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2126-0_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Binu P., and M. Nirmala Devi. "An Effective Logic Obfuscation Technique with AES Encryption Module for Design Protection." In Inventive Computation Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33846-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Di Crescenzo, Giovanni, Abhrajit Sengupta, Ozgur Sinanoglu, and Muhammad Yasin. "Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory." In Innovative Security Solutions for Information Technology and Communications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41025-4_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Hakimi, Asma’a, and Abu Bakar Md Sultan. "Hybrid Obfuscation of Encryption." In Coding Theory Essentials [Working Title]. IntechOpen, 2023. http://dx.doi.org/10.5772/intechopen.109662.

Full text
Abstract:
Obfuscation is an encryption method. It allows the programmer to reform the code for protection. Obfuscation has promising chance to change the way of coding, where the programmer has the ability to program with any language, not necessarily English. Obfuscation, Unicode, and mathematical equations have the possibility to change strings and identifiers and to hide secret algorithms and business rules. Special dictionary is used for the string obfuscation to hide the logic of the program. The hybrid obfuscation technique will be implemented into a tool that automatically converts the code. It can be can be used for games and mobile applications for protection. With obfuscation, the application still has the ability to perform sufficiently and provide the desired output without any delays in performing timing. After obfuscating the source file, reverser still has the ability to break the object file but will not be able to read or understand and when obfuscation technique is complicated, reversing leads to error where original code disappears. In this chapter, hybrid obfuscation will be presented with examples, and obfuscation table is presented as well for future use.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Logic Obfuscation"

1

Bhavani, Bhavin, Anupam Mathur, Sreeja Rajendran, Vinay Palaparthy, and Yash Agrawal. "Enhancing SRAM Array Security Through Transmission Gate-Based Logic Obfuscation." In 2024 IEEE 33rd Asian Test Symposium (ATS). IEEE, 2024. https://doi.org/10.1109/ats64447.2024.10915378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Srivastava, Saurabh, and Sangeeta Nakhate. "FPGA-Implemented Reconfigurable Logic Locking Using N-Stage Delays for Obfuscation." In 2025 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS). IEEE, 2025. https://doi.org/10.1109/sceecs64059.2025.10940977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gandhi, Jugal, Nikhil Handa, Abhay Nayak, et al. "SHAKTI: Securing Hardware IPs by Cascade Gated Multiplexer-Based Logic Obfuscation." In 2025 38th International Conference on VLSI Design and 2025 24th International Conference on Embedded Systems (VLSID). IEEE, 2025. https://doi.org/10.1109/vlsid64188.2025.00037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Leon, and Alex Orailoglu. "Locked-by-Design: Enhancing White-box Logic Obfuscation with Effective Key Mutation." In 2024 IEEE International Test Conference (ITC). IEEE, 2024. http://dx.doi.org/10.1109/itc51657.2024.00028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chakraborty, Haimanti, and Ranga Vemuri. "Combined Split Manufacturing and Logic Obfuscation Based on Emerging Technologies at High Level for Secure 3D IC Design." In 2024 IEEE 67th International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2024. http://dx.doi.org/10.1109/mwscas60917.2024.10658909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sampath, Amrutha, Kristofor Dickson, George W. Lange, Carey Wu, and Keith A. Serrels. "Evaluation of the Analyzability of Complex Secure Intellectual Property Using Fault Isolation Techniques versus the Hardware Security Threat They Pose." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0385.

Full text
Abstract:
Abstract Secure edge devices and the need for hardware security are of paramount importance due to the growing demand for cybersecurity. Hardware security has been strengthened using complex architecture to provide uncompromisable security and prevent malicious cybersecurity attacks. To prevent unauthorized access using even the most advanced failure analysis (FA) techniques, the Hardware Security Module (HSM) implements cryptographic algorithms and data obfuscation using many raw combinational logic and state machines. When a newly taped-out device fails to operate or fails to come out of its
APA, Harvard, Vancouver, ISO, and other styles
7

Ibrahimpasic, Tarik, Grace Li Zhang, Michaela Brunner, Georg Sigl, Bing Li, and Ulf Schlichtmann. "ScanCamouflage: Obfuscating Scan Chains with Camouflaged Sequential and Logic Gates." In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Yu-Wei, and Nur A. Touba. "Improving logic obfuscation via logic cone analysis." In 2015 16th Latin-American Test Symposium (LATS). IEEE, 2015. http://dx.doi.org/10.1109/latw.2015.7102410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, A. V. Pavan, S. Bharathi, Ch Meghana, K. Anusha, and M. Priyatharishini. "Toggle Count Based Logic Obfuscation." In 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2019. http://dx.doi.org/10.1109/iceca.2019.8821935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rajendran, Jeyavijayan, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri. "Security analysis of logic obfuscation." In the 49th Annual Design Automation Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2228360.2228377.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Logic Obfuscation"

1

Koushanfar, F., and J. Kong. IC Piracy Protection by APUF and Logic Obfuscation. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada597856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!