All Stories

  1. High-Level Synthesis of Key-Obfuscated RTL IP with Design Lockout and Camouflaging
  2. Interval Arithmetic and Self-Similarity Based RTL Input Vector Control for Datapath Leakage Minimization
  3. A Graph-based Approach Towards HardwareTrojan Vulnerability Analysis