نتایج جستجو برای: IP Piracy
تعداد نتایج: 42073 فیلتر نتایج به سال:
fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. in untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious trojans. understanding the netlist topology is the ultimate goal of the reverse engineering process. in this paper, we propose...
With the globalization of integrated circuit (IC) design flow and the outsourcing of chip fabrication service, intellectual property (IP) piracy and malicious logic insertion become main security threats to tamper hardware infrastructures. While most of the protection methods are dedicated for digital circuits, we try to protect radio-frequency (RF) designs which are more likely to be IP piracy...
Semiconductor supply chain is increasingly getting exposed to variety of security attacks such as Trojan insertion, cloning, counterfeiting, reverse engineering (RE), piracy of Intellectual Property (IP) or Integrated Circuit (IC) and side-channel analysis due to involvement of untrusted parties. In this paper, we propose transistor threshold voltage-defined switches to camouflage the logic gat...
Intellectual Property Protection (IPP) is very important for a design created by IP owner. For this, IP owner embeds watermark in its design. One such type of technique is suggested by Oliviera, in which modification of State Transition Graph (STG) of a digital circuit takes place in such a way that it is not possible for the intruder to find that there is a watermark embedded in the circuit. I...
It is a well-known fact that design productivity is failing to keep pace with the big increase in the demands of applications and advanced silicon technology, especially in the domain of portable electronics. Moreover owing to the massive complexity of modern systems-on-chip (SoC), complete in-house development is impossible, and thus globalization of the design process has established itself a...
* The authors would like to thank wholeheartedly the editor and the anonymous referees for their insightful comments and great help with the publication of this paper. Abstract Through a thematic analysis of 45 in-depth interviews via the theoretical frameworks of the theory of reasoned action and culture change, this study explores the grass roots voices concerning Chinese copyright piracy of ...
This study explores the interaction between innovations and financial markets using newly available data of China that present significant geographic variations in economic development. Empirical evidence suggests that provincial banking development encourages local innovations, and provincial intellectual property (IP) protection raises the market values of local firms. Firmlevel innovations l...
In many developing countries intellectual property infringement and the commerce of pirate goods is an entrepreneurial activity. Digital piracy is very often the only media for having access to music, cinema, books and software. At the same time, bio-prospecting and infringement of indigenous knowledge rights by international consortiums is usual in places with high biodiversity. In these arena...
The design and manufacturing steps of a chip typically involve several parties. For example, may comprise third-party intellectual property (IP) cores the integrated circuit (IC) fabrication be outsourced to foundry. IP ICs are shared with potentially untrusted third parties and, as result, subject piracy attacks. Even more, any legally purchased reverse engineered retrieve down transistor leve...
Reversible circuits are vulnerable to intellectual property and integrated circuit piracy. To show these vulnerabilities, a detailed understanding on how to identify the function embedded in a reversible circuit is crucial. To obtain the embedded function, one needs to know the synthesis approach used to generate the reversible circuit in the first place. We present a machine learning based sch...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید