Removal Attacks on Logic Locking and Camouflaging Techniques

With the adoption of a globalized and distributed IC design flow, IP piracy, reverse engineering, and counterfeiting threats are becoming more prevalent. Logic obfuscation techniques including logic locking and IC camouflaging have been developed to address these emergent challenges. A major challen...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on emerging topics in computing Vol. 8; no. 2; pp. 517 - 532
Main Authors: Yasin, Muhammad, Mazumdar, Bodhisatwa, Sinanoglu, Ozgur, Rajendran, Jeyavijayan
Format: Journal Article
Language:English
Published: New York IEEE 01.04.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:2168-6750, 2168-6750
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first