Advertisement

Conclusion and Future Work

Chapter
  • 97 Downloads

Abstract

This book has proposed a synergistic framework for hardware IP privacy and integrity protection. The five proposed algorithms are all built upon rigorous mathematical modeling and can collaborate with each other to prevent cross-stage violations. This chapter summarizes the book and further points out promising directions to further enhance the hardware against IP privacy and integrity violations.

Keywords

Split manufacturing friendly physical design Full chip camouflaging Analytical camouflaging security analysis 

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Electrical and Computer EngineeringThe University of Texas at AustinAustinUSA

Personalised recommendations