Intellectual property design with puf-based hardware security

HIGHLIGHTS

  • What: This study proposes a technique to make the IP core more resilient to hardware attacks by appending Physically Unclonable Functions (PUF) for signature analysis of the IP response. This approach demonstrated the engineering of power side channels that can cause leakage of information below the threshold limit. The major goal is to attempt to very likely identify the existence of a trojan by identifying its design`s overabundance on various design parameters, such as power or latency, in contrast to an uninfected circuit.
  • Who: gerry from the Anil Neerukonda Institute of Technology and Sciences . . .

     

    Logo ScioWire Beta black

    If you want to have access to all the content you need to log in!

    Thanks :)

    If you don't have an account, you can create one here.

     

Scroll to Top

Add A Knowledge Base Question !

+ = Verify Human or Spambot ?