This chapter discusses the fundamental concepts of design and testing and their role in hardware obfuscation. It outlines the traditional design flow of integrated circuits and assesses the vulnerabilities associated with the verification techniques and testing structures that can expose the design details and help reverse-engineer the functionality. A survey of security enhancement schemes has been presented. Furthermore, different classifications of hardware obfuscation have been discussed that cover the associated vulnerabilities of key management in nonvolatile memories (NVMs). The review of nonvolatile memories, emerging technologies and hardware-based cryptographic primitives, physical unclonable functions (PUFs) and true random number generators (TRNGs) and their use in hardware obfuscation techniques has been deliberated.
CITATION STYLE
Saqib, F., & Plusquellic, J. (2017). VLSI test and hardware security background for hardware obfuscation. In Hardware Protection through Obfuscation (pp. 33–68). Springer International Publishing. https://doi.org/10.1007/978-3-319-49019-9_2
Mendeley helps you to discover research relevant for your work.