This book demonstrates the breadth and depth of IP protection
through logic locking, considering both attacker/adversary and
defender/designer perspectives. The authors draw a
semi-chronological picture of the evolution of logic locking during
the last decade, gathering and describing all the DO’s and
DON’Ts in this approach. They describe simple-to-follow scenarios
and guide readers to navigate/identify threat models and
design/evaluation flow for further studies. Readers will gain a
comprehensive understanding of all fundamentals of logic locking.
Â
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!