Review of Obfuscation Techniques in FPGA (Field Programmable Gate Array) Security
DOI:
10.22214/ijraset.2025.66519
Publication Date:
2025-01-17T14:58:17Z
AUTHORS (4)
ABSTRACT
Abstract: Hardware security is crucial for FPGA-based systems in addition to the functional realization of the system according
to the expected specifications and optimal performance. FPGA has a longer supply-chain model that involves many entities. This
results in greater opportunities for security threats and trust issues. Hardware Obfuscation is one method that can be used as a
mechanism for a security effort from the threats of IP Piracy, Overbuilding, Trojan Hardware, Reverse Engineering, and
Bitstream Modification. Obfuscation technique variations for FPGA-based system security cannot be fully implemented properly
according to the specifications and limitations of the system design. To prevent and anticipate security threat attacks on FPGAbased systems, a performance analysis is needed to implement appropriate and effective techniques in system security. This paper
discusses obfuscation techniques that can be implemented for security on FPGA-based systems according to the design process
flow.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (0)
CITATIONS (0)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....