Active hardware metering for intellectual property protection and security, USENIX Security, pp.291-306, 2007. ,
Reverse engineering of embedded consumer electronic systems, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE), pp.352-356, 2011. ,
DOI : 10.1109/ISCE.2011.5973848
EPIC, Proceedings of the conference on Design, automation and test in Europe, DATE '08, pp.1069-1074, 2008. ,
DOI : 10.1145/1403375.1403631
Fault Analysis-Based Logic Encryption, IEEE Transactions on Computers, vol.64, issue.2, pp.410-424, 2015. ,
DOI : 10.1109/TC.2013.193
Logic encryption: A fault analysis perspective, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp.953-958, 2012. ,
DOI : 10.1109/DATE.2012.6176634
A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans, 2014 IEEE 20th International On-Line Testing Symposium (IOLTS), pp.49-54, 2014. ,
DOI : 10.1109/IOLTS.2014.6873671
URL : https://hal.archives-ouvertes.fr/lirmm-01025275
A comparative study of software protection tools suited for e-commerce with contributions to software watermarking and smart cards, 2003. ,
Security analysis of logic obfuscation, Proceedings of the 49th Annual Design Automation Conference on, DAC '12, pp.83-89, 2012. ,
DOI : 10.1145/2228360.2228377
HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.28, issue.10, pp.1493-1502, 2009. ,
DOI : 10.1109/TCAD.2009.2028166
The state-of-the-art in semiconductor reverse engineering, Proceedings of the 48th Design Automation Conference on, DAC '11, pp.333-338, 2011. ,
DOI : 10.1145/2024724.2024805
Obfuscation as Intellectual Rights Protection in VHDL Language, 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07), pp.337-340, 2007. ,
DOI : 10.1109/CISIM.2007.51
Intellectual property protection (IPP) using obfuscation in C, VHDL, and Verilog coding, Independent Component Analyses, Wavelets, Neural Networks, Biosystems, and Nanoengineering IX, 2011. ,
DOI : 10.1117/12.884142
Security analysis of integrated circuit camouflaging, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.709-720, 2013. ,
DOI : 10.1145/2508859.2516656
(2012, #mar#) Circuit camouflage technology ,
Preventing IC Piracy Using Reconfigurable Logic Barriers, IEEE Design & Test of Computers, vol.27, issue.1, pp.66-75, 2010. ,
DOI : 10.1109/MDT.2010.24
An locking and unlocking primitive function of FSM-modeled sequential systems based on extracting logical property, International Journal of Information, vol.16, issue.8, pp.6279-6290, 2013. ,
CSST: Preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly, 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), pp.46-51, 2014. ,
DOI : 10.1109/DFT.2014.6962096
Active defense against counterfeiting attacks through robust antifuse-based on-chip locks, 2014 IEEE 32nd VLSI Test Symposium (VTS), pp.1-6, 2014. ,
DOI : 10.1109/VTS.2014.6818793
ITC'99 Benchmark Circuits - Preliminary Results, International Test Conference 1999. Proceedings (IEEE Cat. No.99CH37034), p.1125, 1999. ,
DOI : 10.1109/TEST.1999.805857
Protecting integrated circuits from piracy with test-aware logic locking, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2014. ,
DOI : 10.1109/ICCAD.2014.7001361
Optical Fault Induction Attacks, International Workshop on Cryptographic Hardware and Embedded Systems, 2002. ,
DOI : 10.1007/3-540-36400-5_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.5680
A PUF Based on a Transient Effect Ring Oscillator and Insensitive to Locking Phenomenon, IEEE Transactions on Emerging Topics in Computing, vol.2, issue.1, pp.30-36, 2014. ,
DOI : 10.1109/TETC.2013.2287182
URL : https://hal.archives-ouvertes.fr/hal-00961503
The butterfly PUF protecting IP on every FPGA, IEEE International Workshop on Hardware-Oriented Security and Trust, pp.67-70, 2008. ,
DOI : 10.1109/hst.2008.4559053
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.458.2672
A technique to build a secret key in integrated circuits for identification and authentication applications, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525), pp.176-179, 2004. ,
DOI : 10.1109/VLSIC.2004.1346548