Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a groundbreaking paper on hardware obfuscation techniques presented at CHES 2018. Delve into the concept of stealthy opaque predicates and their application in obfuscating constant expressions with minimal overhead. Learn about the authors' main contributions, examine case studies, and understand the implications for watermarking. Gain insights from the presentation's conclusion and participate in the audience question session to deepen your understanding of this innovative approach to hardware security.
Syllabus
Introduction
What is Obfuscation
Previous work
Main contribution
Case studies
Watermarking
Conclusion
Questions
Audience Question
Taught by
TheIACR
Related Courses
Grow to Greatness: Smart Growth for Private Businesses, Part IUniversity of Virginia via Coursera Designing and Executing Information Security Strategies
University of Washington via Coursera Retos de la agricultura y la alimentación en el siglo XXI
Miríadax Ressources naturelles et développement durable
Université catholique de Louvain via edX Innovating in Health Care
Harvard University via edX