Conclusion and Future Work
- 97 Downloads
This book has proposed a synergistic framework for hardware IP privacy and integrity protection. The five proposed algorithms are all built upon rigorous mathematical modeling and can collaborate with each other to prevent cross-stage violations. This chapter summarizes the book and further points out promising directions to further enhance the hardware against IP privacy and integrity violations.