{"id":3638,"date":"2022-12-17T21:09:52","date_gmt":"2022-12-17T21:09:52","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3638"},"modified":"2022-12-18T17:36:35","modified_gmt":"2022-12-18T17:36:35","slug":"obfusgem","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/fault-injection-analysis\/obfusgem\/","title":{"rendered":"ObfusGEM"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Tool Name<\/h2>\n\n\n\n<p>ObfusGEM<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Description<\/strong><\/h2>\n\n\n\n<p>We propose a tool-driven security-aware approach to enhance the 2 most effective candidate locking locations, on-chip memory and data path. We show that through minor design modifications of the on-chip memory and data path architecture, one can exponentially improve the architecture\/application level security of prior locking art with only a modest design overhead.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>More Info<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"https:\/\/github.com\/mzuzak\/ObfusGEM\" target=\"_blank\" rel=\"noreferrer noopener\">tool link<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Publications\/References<\/strong><\/h2>\n\n\n\n<p>Zuzak, Michael &amp; Srivastava, Ankur. (2020). ObfusGEM: Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design. 260-271. 10.1145\/3422575.3422798. <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3422575.3422798\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/dl.acm.org\/doi\/10.1145\/3422575.3422798<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contacts<\/strong><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Tool Name ObfusGEM Description We propose a tool-driven security-aware approach to enhance the 2 most effective candidate locking locations, on-chip memory and data path. We show that through minor design modifications of the on-chip memory and data path architecture, one can exponentially improve the architecture\/application level security of prior locking art with only a modest &hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":1696,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3638"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3638"}],"version-history":[{"count":2,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3638\/revisions"}],"predecessor-version":[{"id":3725,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3638\/revisions\/3725"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1696"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}