Journal articles on the topic 'Logic Obfuscation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Logic Obfuscation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Park, Beomsoo, and Nima Maghari. "Logic Obfuscation Through Enhanced Threshold Voltage Defined Logic Family." IEEE Transactions on Circuits and Systems II: Express Briefs 67, no. 12 (2020): 3407–11. http://dx.doi.org/10.1109/tcsii.2020.2993447.
Full textLIU, Liang, Jiacheng ZHU, Zhe ZHANG, Lixiang SHEN, Yufeng SUN, and Dejun MU. "A logic obfuscation attack method based on gate-level information flow tracing techniques." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 42, no. 1 (2024): 78–83. http://dx.doi.org/10.1051/jnwpu/20244210078.
Full textThursday Ehis, Akhigbe-mudu. "Analytical Framework of Cloud Homomorphic Encryption / Cryptographic Logic Obfuscation for Cyber Health Hygiene." Journal of Technology Innovations and Energy 1, no. 2 (2022): 28–38. http://dx.doi.org/10.56556/jtie.v1i2.134.
Full textAkhigbe-mudu, Thursday Ehis. "Analytical Framework of Cloud Homomorphic Encryption / Cryptographic Logic Obfuscation for Cyber Health Hygiene." Journal of Technology Innovations and Energy 1, no. 2 (2022): 28–38. https://doi.org/10.5281/zenodo.6839004.
Full textZhang, Jiliang. "A Practical Logic Obfuscation Technique for Hardware Security." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24, no. 3 (2016): 1193–97. http://dx.doi.org/10.1109/tvlsi.2015.2437996.
Full textHoque, Tamzidul, Rajat Subhra Chakraborty, and Swarup Bhunia. "Hardware Obfuscation and Logic Locking: A Tutorial Introduction." IEEE Design & Test 37, no. 3 (2020): 59–77. http://dx.doi.org/10.1109/mdat.2020.2984224.
Full textLilly, Carol S. "Amoral Realism or Immoral Obfuscation?" Slavic Review 55, no. 4 (1996): 749–54. http://dx.doi.org/10.2307/2501234.
Full textTopaloglu, Rasit Onur. "Quantum Logic Locking for Security." J 6, no. 3 (2023): 411–20. http://dx.doi.org/10.3390/j6030027.
Full textShamsi, Kaveh, Meng Li, Kenneth Plaks, Saverio Fazzari, David Z. Pan, and Yier Jin. "IP Protection and Supply Chain Security through Logic Obfuscation." ACM Transactions on Design Automation of Electronic Systems 24, no. 6 (2019): 1–36. http://dx.doi.org/10.1145/3342099.
Full textMirmohammadi, Zahra, and Shahram Etemadi Borujeni. "A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking." Electronics 12, no. 5 (2023): 1107. http://dx.doi.org/10.3390/electronics12051107.
Full textYue, Michael, and Sara Tehranipoor. "A Novel Probability-Based Logic-Locking Technique: ProbLock." Sensors 21, no. 23 (2021): 8126. http://dx.doi.org/10.3390/s21238126.
Full textDatta, Rajesh, Guangwei Zhao, Kanad Basu, and Kaveh Shamsi. "A Security Analysis of Circuit Clock Obfuscation." Cryptography 6, no. 3 (2022): 43. http://dx.doi.org/10.3390/cryptography6030043.
Full textWu, Jiaming, Olivia Dizon-Paradis, Sazadur Rahman, Damon L. Woodard, and Domenic Forte. "Protecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo-Random Number Generation." Cryptography 9, no. 1 (2025): 6. https://doi.org/10.3390/cryptography9010006.
Full textZhu, Tinghan. "Evaluating satisfiability modulo theorem solvers for code deobfuscation." Theoretical and Natural Science 51, no. 1 (2024): 91–96. http://dx.doi.org/10.54254/2753-8818/51/2024ch0178.
Full textAlasad, Qutaiba, Jiann-Shuin Yuan, and Pramod Subramanyan. "Strong Logic Obfuscation with Low Overhead against IC Reverse Engineering Attacks." ACM Transactions on Design Automation of Electronic Systems 25, no. 4 (2020): 1–31. http://dx.doi.org/10.1145/3398012.
Full textYang, Jianlei, Xueyan Wang, Qiang Zhou, et al. "Exploiting Spin-Orbit Torque Devices As Reconfigurable Logic for Circuit Obfuscation." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 38, no. 1 (2019): 57–69. http://dx.doi.org/10.1109/tcad.2018.2802870.
Full textBagul, Priyanka, and Vandana Inamdar. "Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification." International Journal of Reconfigurable Computing 2023 (July 3, 2023): 1–13. http://dx.doi.org/10.1155/2023/4550758.
Full textNatarajan, Baluprithviraj Krishnaswamy, and Vijayachitra Senniappan. "Logic obfuscation technique using configurable gate diffusion input for improved hardware security." IEICE Electronics Express 15, no. 19 (2018): 20180802. http://dx.doi.org/10.1587/elex.15.20180802.
Full textVijayakumar, Arunkumar, Vinay C. Patil, Daniel E. Holcomb, Christof Paar, and Sandip Kundu. "Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques." IEEE Transactions on Information Forensics and Security 12, no. 1 (2017): 64–77. http://dx.doi.org/10.1109/tifs.2016.2601067.
Full textRoshanisefat, Shervin, Hadi Mardani Kamali, Houman Homayoun, and Avesta Sasan. "SAT-Hard Cyclic Logic Obfuscation for Protecting the IP in the Manufacturing Supply Chain." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28, no. 4 (2020): 954–67. http://dx.doi.org/10.1109/tvlsi.2020.2968552.
Full textAnalysis, of Hardware Security to Prevent the Scan Based Attacks by using Sticky Counter, Lavanya Rangu, G. Shanmugapriya Dr., and S. Gopala Krishna Mr. "10.31142/ijtsrd11335." International Journal of Trend in Scientific Research and Development 2, no. 3 (2018): 1266–78. https://doi.org/10.5281/zenodo.3577381.
Full textIvanov, Michael A., Irina G. Konnova, Evgeniy A. Salikov, and Maria A. Stepanova. "Obfuscation of logic schemes of pseudo-random number generators based on linear and non-linear feedback shift registers." Bezopasnost informacionnyh tehnology 28, no. 1 (2021): 74–83. http://dx.doi.org/10.26583/bit.2021.1.06.
Full textGursky, Jacob, Martin J. Riedl, Katie Joseff, and Samuel Woolley. "Chat Apps and Cascade Logic: A Multi-Platform Perspective on India, Mexico, and the United States." Social Media + Society 8, no. 2 (2022): 205630512210947. http://dx.doi.org/10.1177/20563051221094773.
Full textFechan, Andriy, and Oleksii Khoverko. "Software code protection on the .NET platform." Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Ìnformacìjnì sistemi ta merežì 17 (June 2025): 17–33. https://doi.org/10.23939/sisn2025.17.017.
Full textRaj Parikh and Khushi Parikh. "A survey on AI-augmented Secure RTL design for hardware trojan prevention." International Journal of Science and Research Archive 14, no. 3 (2025): 486–95. https://doi.org/10.30574/ijsra.2025.14.3.0644.
Full textBoussaha, Soumaya, Lukas Hock, Miguel Bermejo, et al. "FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Entropy-based Thresholds." Proceedings on Privacy Enhancing Technologies 2024, no. 3 (2024): 540–60. http://dx.doi.org/10.56553/popets-2024-0092.
Full textBridges, Lauren. "Infrastructural obfuscation: unpacking the carceral logics of the Ring surveillant assemblage." Information, Communication & Society 24, no. 6 (2021): 830–49. http://dx.doi.org/10.1080/1369118x.2021.1909097.
Full textNur Widiyasono, Siti Rahayu Selamat, Angga Sinjaya, Rianto, Randi Rizal, and Mugi Praseptiawan. "Investigation of Malware Redline Stealer Using Static and Dynamic Analysis Method Forensic." Journal of Advanced Research in Applied Sciences and Engineering Technology 48, no. 2 (2024): 49–62. http://dx.doi.org/10.37934/araset.48.2.4962.
Full textHu, Jiankun. "H. -Y. Tran, J. Hu and H. R. Pota, "Smart Meter Data Obfuscation With a Hybrid Privacy-Preserving Data Publishing Scheme Without a Trusted Third Party," in IEEE Internet of Things Journal, vol. 9, no. 17, pp. 16080-16095, 1 Sept.1, 2022, doi: 10.1109/JIOT.2022.3153043." IEEE Internet of Things Journal 9, no. 17 (2024): 16080–95. https://doi.org/10.5281/zenodo.10963525.
Full textHou, Chongyang, Shuye Zhang, Rui Liu, et al. "Boosting flexible electronics with integration of two‐dimensional materials." InfoMat 6, no. 7 (2024): e12555. https://doi.org/10.1002/inf2.12555.
Full textBrito, Rodrigo, Stephen Joseph, and Edward Sellman. "Mindfulness “in” Education as a Form of Iatrogenesis." Journal of Transformative Education 19, no. 3 (2021): 261–83. http://dx.doi.org/10.1177/1541344620987231.
Full textCowan, Sarah Louise. "To Touch Time: U.S. Black Feminist Modernist Sculpture in the 1970s and 1980s." Arts 13, no. 1 (2024): 21. http://dx.doi.org/10.3390/arts13010021.
Full textKuipers, Giselinde, Thomas Franssen, and Sylvia Holla. "Clouded judgments? Aesthetics, morality and everyday life in early 21st century culture." European Journal of Cultural Studies 22, no. 4 (2019): 383–98. http://dx.doi.org/10.1177/1367549419861634.
Full textChung, Andrew J. "Vibration, Difference, and Solidarity in the Anthropocene." Resonance 2, no. 2 (2021): 218–41. http://dx.doi.org/10.1525/res.2021.2.2.218.
Full textKnox, Jeremy. "Project Pulse: co-designing the ‘smart’ campus with Internet of (teaching and learning) Things." Proceedings of the International Conference on Networked Learning 11 (May 14, 2018): 260–63. http://dx.doi.org/10.54337/nlc.v11.8764.
Full textde la Torre, Juan Carlos, Javier Jareño, José Miguel Aragón-Jurado, Sébastien Varrette, and Bernabé Dorronsoro. "Source code obfuscation with genetic algorithms using LLVM code optimizations." Logic Journal of the IGPL, May 14, 2024. http://dx.doi.org/10.1093/jigpal/jzae069.
Full textYu, Tongguang, Yixin Xu, Shan Deng, et al. "Hardware functional obfuscation with ferroelectric active interconnects." Nature Communications 13, no. 1 (2022). http://dx.doi.org/10.1038/s41467-022-29795-3.
Full textYu, Tongguang, Yixin Xu, Shan Deng, et al. "Hardware functional obfuscation with ferroelectric active interconnects." Nature Communications 13, no. 1 (2022). http://dx.doi.org/10.1038/s41467-022-29795-3.
Full textKolhe, Gaurav, Tyler David Sheaves, Sai Manoj P. D, et al. "Breaking the Design and Security trade-off of Look-up Table-based Obfuscation." ACM Transactions on Design Automation of Electronic Systems, February 18, 2022. http://dx.doi.org/10.1145/3510421.
Full textMcDaniel, Isaac, Michael Zuzak, and Ankur Srivastava. "Removal of SAT-Hard Instances in Logic Obfuscation Through Inference of Functionality." ACM Transactions on Design Automation of Electronic Systems, June 25, 2024. http://dx.doi.org/10.1145/3674903.
Full textAbideen, Zain Ul, Sumathi Gokulanathan, Muayad J. Aljafar, and Samuel Pagliarini. "An Overview of FPGA-inspired Obfuscation Techniques." ACM Computing Surveys, July 9, 2024. http://dx.doi.org/10.1145/3677118.
Full textZuzak, Michael, Yuntao Liu, and Ankur Srivastava. "Security-Aware Resource Binding to Enhance Logic Obfuscation." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023, 1. http://dx.doi.org/10.1109/tcad.2023.3294453.
Full textS., Praveen, and Sojan Lal P. "Array Data Transformation for Source Code Obfuscation." December 27, 2007. https://doi.org/10.5281/zenodo.1057421.
Full textMoraitis, Michail, and Elena Dubrova. "FPGA Design Deobfuscation by Iterative LUT Modification at Bitstream Level." Journal of Hardware and Systems Security, February 16, 2023. http://dx.doi.org/10.1007/s41635-022-00130-y.
Full textHassan, Rakibul, Gaurav Kolhe, Setareh Rafatirad, Houman Homayoun, and Sai Manoj Pudukotai Dinakarrao. "A Neural Network-based Cognitive Obfuscation Towards Enhanced Logic Locking." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021, 1. http://dx.doi.org/10.1109/tcad.2021.3138686.
Full textDeepak, V. A., M. Priyatharishini, and M. Nirmala Devi. "Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques." International Journal of Electronics and Telecommunications, July 20, 2023. http://dx.doi.org/10.24425/ijet.2019.129790.
Full textBaluprithviraj, K. N., S. Vijayachitra, and N. Mahesh. "Logic Locking Based Configurable Obfuscation Cell for Enhanced IC Security." Journal of Electronic Testing, April 26, 2025. https://doi.org/10.1007/s10836-025-06171-9.
Full textAljafar, Muayad J., Florence Azais, Marie-Lise Flottes, and Samuel Pagliarini. "Utilizing layout effects for analog logic locking." Journal of Cryptographic Engineering, April 6, 2024. http://dx.doi.org/10.1007/s13389-024-00350-8.
Full textAzar, Kimia Zamiri, Hadi Mardani Kamali, Houman Homayoun, and Avesta Sasan. "SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks." IACR Transactions on Cryptographic Hardware and Embedded Systems, November 9, 2018, 97–122. http://dx.doi.org/10.46586/tches.v2019.i1.97-122.
Full textKarmakar, Rajit, Harshit Kumar, and Santanu Chattopadhyay. "Efficient Key-gate Placement And Dynamic Scan Obfuscation Towards Robust Logic Encryption." IEEE Transactions on Emerging Topics in Computing, 2020, 1. http://dx.doi.org/10.1109/tetc.2019.2963094.
Full text