Proceedings of the 38th annual Design Automation Conference
Switching and Finite Automata Theory: Computer Science Series
Switching and Finite Automata Theory: Computer Science Series
Remote activation of ICs for piracy prevention and digital right management
Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design
Active hardware metering for intellectual property protection and security
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Active control and digital rights management of integrated circuit IP cores
CASES '08 Proceedings of the 2008 international conference on Compilers, architectures and synthesis for embedded systems
Hardware protection and authentication through netlist level obfuscation
Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design
Introduction to Hardware Security and Trust
Introduction to Hardware Security and Trust
Information hiding in finite state machine
IH'04 Proceedings of the 6th international conference on Information Hiding
Techniques for the creation of digital watermarks in sequential circuit designs
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Hi-index | 0.00 |
In this paper, we propose an efficient locking and unlocking method for sequential systems. The method is based on extracting and utilizing an inherent property of synchronicity directly from the original sequential system without modifying the system. We analyze the synchronicity property in the context of sequential locking and unlocking function. We address the advantages and limitations of proposed method. The feasibility of proposed method is also demonstrated.