Review of Obfuscation Techniques in FPGA (Field Programmable Gate Array) Security

DOI: 10.22214/ijraset.2025.66519 Publication Date: 2025-01-17T14:58:17Z
ABSTRACT
Abstract: Hardware security is crucial for FPGA-based systems in addition to the functional realization of the system according to the expected specifications and optimal performance. FPGA has a longer supply-chain model that involves many entities. This results in greater opportunities for security threats and trust issues. Hardware Obfuscation is one method that can be used as a mechanism for a security effort from the threats of IP Piracy, Overbuilding, Trojan Hardware, Reverse Engineering, and Bitstream Modification. Obfuscation technique variations for FPGA-based system security cannot be fully implemented properly according to the specifications and limitations of the system design. To prevent and anticipate security threat attacks on FPGAbased systems, a performance analysis is needed to implement appropriate and effective techniques in system security. This paper discusses obfuscation techniques that can be implemented for security on FPGA-based systems according to the design process flow.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (0)
CITATIONS (0)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....