Security of functionally obfuscated DSP cores
This chapter discusses the security of functionally obfuscated digital signal processing (DSP) cores. Some of the most prominent aspects of this chapter include descriptions of the attack models, points of vulnerability for launching reverse engineering (RE), security properties of the functional-obfuscation process, security against removal attack in the context of DSP cores, hardware-design methods of various state-of-the-art security solutions and a comparative perspective of different approaches used in the context of DSP cores.
Preview this chapter:
Security of functionally obfuscated DSP cores, Page 1 of 2
< Previous page Next page > /docserver/preview/fulltext/books/cs/pbcs067e/PBCS067E_ch9-1.gif /docserver/preview/fulltext/books/cs/pbcs067e/PBCS067E_ch9-2.gif