Academic literature on the topic 'Logic Obfuscation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Logic Obfuscation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Logic Obfuscation"
Park, Beomsoo, and Nima Maghari. "Logic Obfuscation Through Enhanced Threshold Voltage Defined Logic Family." IEEE Transactions on Circuits and Systems II: Express Briefs 67, no. 12 (2020): 3407–11. http://dx.doi.org/10.1109/tcsii.2020.2993447.
Full textLIU, Liang, Jiacheng ZHU, Zhe ZHANG, Lixiang SHEN, Yufeng SUN, and Dejun MU. "A logic obfuscation attack method based on gate-level information flow tracing techniques." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 42, no. 1 (2024): 78–83. http://dx.doi.org/10.1051/jnwpu/20244210078.
Full textThursday Ehis, Akhigbe-mudu. "Analytical Framework of Cloud Homomorphic Encryption / Cryptographic Logic Obfuscation for Cyber Health Hygiene." Journal of Technology Innovations and Energy 1, no. 2 (2022): 28–38. http://dx.doi.org/10.56556/jtie.v1i2.134.
Full textAkhigbe-mudu, Thursday Ehis. "Analytical Framework of Cloud Homomorphic Encryption / Cryptographic Logic Obfuscation for Cyber Health Hygiene." Journal of Technology Innovations and Energy 1, no. 2 (2022): 28–38. https://doi.org/10.5281/zenodo.6839004.
Full textZhang, Jiliang. "A Practical Logic Obfuscation Technique for Hardware Security." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24, no. 3 (2016): 1193–97. http://dx.doi.org/10.1109/tvlsi.2015.2437996.
Full textHoque, Tamzidul, Rajat Subhra Chakraborty, and Swarup Bhunia. "Hardware Obfuscation and Logic Locking: A Tutorial Introduction." IEEE Design & Test 37, no. 3 (2020): 59–77. http://dx.doi.org/10.1109/mdat.2020.2984224.
Full textLilly, Carol S. "Amoral Realism or Immoral Obfuscation?" Slavic Review 55, no. 4 (1996): 749–54. http://dx.doi.org/10.2307/2501234.
Full textTopaloglu, Rasit Onur. "Quantum Logic Locking for Security." J 6, no. 3 (2023): 411–20. http://dx.doi.org/10.3390/j6030027.
Full textShamsi, Kaveh, Meng Li, Kenneth Plaks, Saverio Fazzari, David Z. Pan, and Yier Jin. "IP Protection and Supply Chain Security through Logic Obfuscation." ACM Transactions on Design Automation of Electronic Systems 24, no. 6 (2019): 1–36. http://dx.doi.org/10.1145/3342099.
Full textMirmohammadi, Zahra, and Shahram Etemadi Borujeni. "A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking." Electronics 12, no. 5 (2023): 1107. http://dx.doi.org/10.3390/electronics12051107.
Full textDissertations / Theses on the topic "Logic Obfuscation"
Lu, Weiyun. "Formally Verified Code Obfuscation in the Coq Proof Assistant." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39994.
Full textChakraborty, Rajat Subhra. "Hardware Security through Design Obfuscation." Cleveland, Ohio : Case Western Reserve University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1270133481.
Full textTaylor, Christopher P. "A Security Framework for Logic Locking Through Local and Global Structural Analysis." The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1587681912604658.
Full textGodfroy, Hubert. "Réflexion, calculs et logiques." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0130/document.
Full textGodfroy, Hubert. "Réflexion, calculs et logiques." Electronic Thesis or Diss., Université de Lorraine, 2017. http://www.theses.fr/2017LORR0130.
Full textBooks on the topic "Logic Obfuscation"
McCabe, Joshua T. American Exceptionalism Revisited. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190841300.003.0001.
Full textBook chapters on the topic "Logic Obfuscation"
Rajendran, Jeyavijayan, and Siddharth Garg. "Logic Encryption." In Hardware Protection through Obfuscation. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49019-9_3.
Full textRahman, Md Moshiur, and Swarup Bhunia. "Hardware Obfuscation and Logic Locking." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1646-1.
Full textRahman, Md Moshiur, and Swarup Bhunia. "Hardware Obfuscation and Logic Locking." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1646.
Full textSaha, Akashdeep, Hrivu Banerjee, Rajat Subhra Chakraborty, and Debdeep Mukhopadhyay. "Revisiting Logic Obfuscation Using Cellular Automata." In Advances in Intelligent Systems and Computing. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0542-1_3.
Full textChen, Yi-Chung, Yandan Wang, Wei Zhang, Yiran Chen, and Hai (Helen) Li. "In-place Logic Obfuscation for Emerging Nonvolatile FPGAs." In Fundamentals of IP and SoC Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50057-7_11.
Full textAbideen, Zain Ul, and Samuel Pagliarini. "ReBO-Driven IC Design: Leveraging Reconfigurable Logic for Obfuscation." In Synthesis Lectures on Digital Circuits & Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-77509-3_3.
Full textMohankumar, N., M. Jayakumar, and M. Nirmala Devi. "Lightweight Logic Obfuscation in Combinational Circuits for Improved Security—An Analysis." In Expert Clouds and Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2126-0_19.
Full textKumar, Binu P., and M. Nirmala Devi. "An Effective Logic Obfuscation Technique with AES Encryption Module for Design Protection." In Inventive Computation Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33846-6_3.
Full textDi Crescenzo, Giovanni, Abhrajit Sengupta, Ozgur Sinanoglu, and Muhammad Yasin. "Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory." In Innovative Security Solutions for Information Technology and Communications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41025-4_12.
Full textAl-Hakimi, Asma’a, and Abu Bakar Md Sultan. "Hybrid Obfuscation of Encryption." In Coding Theory Essentials [Working Title]. IntechOpen, 2023. http://dx.doi.org/10.5772/intechopen.109662.
Full textConference papers on the topic "Logic Obfuscation"
Bhavani, Bhavin, Anupam Mathur, Sreeja Rajendran, Vinay Palaparthy, and Yash Agrawal. "Enhancing SRAM Array Security Through Transmission Gate-Based Logic Obfuscation." In 2024 IEEE 33rd Asian Test Symposium (ATS). IEEE, 2024. https://doi.org/10.1109/ats64447.2024.10915378.
Full textSrivastava, Saurabh, and Sangeeta Nakhate. "FPGA-Implemented Reconfigurable Logic Locking Using N-Stage Delays for Obfuscation." In 2025 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS). IEEE, 2025. https://doi.org/10.1109/sceecs64059.2025.10940977.
Full textGandhi, Jugal, Nikhil Handa, Abhay Nayak, et al. "SHAKTI: Securing Hardware IPs by Cascade Gated Multiplexer-Based Logic Obfuscation." In 2025 38th International Conference on VLSI Design and 2025 24th International Conference on Embedded Systems (VLSID). IEEE, 2025. https://doi.org/10.1109/vlsid64188.2025.00037.
Full textLi, Leon, and Alex Orailoglu. "Locked-by-Design: Enhancing White-box Logic Obfuscation with Effective Key Mutation." In 2024 IEEE International Test Conference (ITC). IEEE, 2024. http://dx.doi.org/10.1109/itc51657.2024.00028.
Full textChakraborty, Haimanti, and Ranga Vemuri. "Combined Split Manufacturing and Logic Obfuscation Based on Emerging Technologies at High Level for Secure 3D IC Design." In 2024 IEEE 67th International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2024. http://dx.doi.org/10.1109/mwscas60917.2024.10658909.
Full textSampath, Amrutha, Kristofor Dickson, George W. Lange, Carey Wu, and Keith A. Serrels. "Evaluation of the Analyzability of Complex Secure Intellectual Property Using Fault Isolation Techniques versus the Hardware Security Threat They Pose." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0385.
Full textIbrahimpasic, Tarik, Grace Li Zhang, Michaela Brunner, Georg Sigl, Bing Li, and Ulf Schlichtmann. "ScanCamouflage: Obfuscating Scan Chains with Camouflaged Sequential and Logic Gates." In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546888.
Full textLee, Yu-Wei, and Nur A. Touba. "Improving logic obfuscation via logic cone analysis." In 2015 16th Latin-American Test Symposium (LATS). IEEE, 2015. http://dx.doi.org/10.1109/latw.2015.7102410.
Full textKumar, A. V. Pavan, S. Bharathi, Ch Meghana, K. Anusha, and M. Priyatharishini. "Toggle Count Based Logic Obfuscation." In 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2019. http://dx.doi.org/10.1109/iceca.2019.8821935.
Full textRajendran, Jeyavijayan, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri. "Security analysis of logic obfuscation." In the 49th Annual Design Automation Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2228360.2228377.
Full textReports on the topic "Logic Obfuscation"
Koushanfar, F., and J. Kong. IC Piracy Protection by APUF and Logic Obfuscation. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada597856.
Full text