Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
An Obfuscation Method Based on CFGLUTs for Security of FPGAs

Mansoureh Labafniya; Shahram Etemadi Borujeni

Volume 13, Issue 2 , July 2021, , Pages 157-162

https://doi.org/10.22042/isecure.2021.234848.557

Abstract
  There are many different ways of securing FPGAs to prevent successful reverse engineering. One of the common forms is obfuscation methods. In this paper, we proposed an approach based on obfuscation to prevent FPGAs from successful reverse engineering and, as a result, Hardware Trojan Horses (HTHs) insertion. ...  Read More

Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing

Mansoureh Labbafniya; Shahram Etemadi Borujeni; Roghaye Saeidi

Volume 13, Issue 1 , January 2021, , Pages 47-57

https://doi.org/10.22042/isecure.2020.215265.510

Abstract
   Nowadays the security of the design is so important because of the different available attacks to the system. the main aim of this paper is to improve the security of the circuit design implemented on FPGA device. Two approaches are proposed for this purpose. The first is to fill out empty space ...  Read More