YoVDO

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Case Study Analysis Courses Hardware Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking paper on hardware obfuscation techniques presented at CHES 2018. Delve into the concept of stealthy opaque predicates and their application in obfuscating constant expressions with minimal overhead. Learn about the authors' main contributions, examine case studies, and understand the implications for watermarking. Gain insights from the presentation's conclusion and participate in the audience question session to deepen your understanding of this innovative approach to hardware security.

Syllabus

Introduction
What is Obfuscation
Previous work
Main contribution
Case studies
Watermarking
Conclusion
Questions
Audience Question


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera