A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
On the Difficulty of FSM-based Hardware Obfuscation
2018
Transactions on Cryptographic Hardware and Embedded Systems
In today's Integrated Circuit (IC) production chains, a designer's valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy. To protect against this threat, numerous defenses based on the obfuscation of a circuit's control path, i.e. Finite State Machine (FSM), have been proposed and are commonly believed to be secure. However, the security of these sequential obfuscation schemes is doubtful since realistic capabilities of reverse
doi:10.13154/tches.v2018.i3.293-330
dblp:journals/tches/FyrbiakWDABTP18
fatcat:kztdtiqgjrbb3io3voapa4eqci