VLSI test and hardware security background for hardware obfuscation

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter discusses the fundamental concepts of design and testing and their role in hardware obfuscation. It outlines the traditional design flow of integrated circuits and assesses the vulnerabilities associated with the verification techniques and testing structures that can expose the design details and help reverse-engineer the functionality. A survey of security enhancement schemes has been presented. Furthermore, different classifications of hardware obfuscation have been discussed that cover the associated vulnerabilities of key management in nonvolatile memories (NVMs). The review of nonvolatile memories, emerging technologies and hardware-based cryptographic primitives, physical unclonable functions (PUFs) and true random number generators (TRNGs) and their use in hardware obfuscation techniques has been deliberated.

Cite

CITATION STYLE

APA

Saqib, F., & Plusquellic, J. (2017). VLSI test and hardware security background for hardware obfuscation. In Hardware Protection through Obfuscation (pp. 33–68). Springer International Publishing. https://doi.org/10.1007/978-3-319-49019-9_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free