Главная
Study mode:
on
1
Introduction
2
What is Obfuscation
3
Previous work
4
Main contribution
5
Case studies
6
Watermarking
7
Conclusion
8
Questions
9
Audience Question
Description:
Explore a groundbreaking paper on hardware obfuscation techniques presented at CHES 2018. Delve into the concept of stealthy opaque predicates and their application in obfuscating constant expressions with minimal overhead. Learn about the authors' main contributions, examine case studies, and understand the implications for watermarking. Gain insights from the presentation's conclusion and participate in the audience question session to deepen your understanding of this innovative approach to hardware security.

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

TheIACR
Add to list
0:00 / 0:00