YoVDO

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Case Study Analysis Courses Hardware Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking paper on hardware obfuscation techniques presented at CHES 2018. Delve into the concept of stealthy opaque predicates and their application in obfuscating constant expressions with minimal overhead. Learn about the authors' main contributions, examine case studies, and understand the implications for watermarking. Gain insights from the presentation's conclusion and participate in the audience question session to deepen your understanding of this innovative approach to hardware security.

Syllabus

Introduction
What is Obfuscation
Previous work
Main contribution
Case studies
Watermarking
Conclusion
Questions
Audience Question


Taught by

TheIACR

Related Courses

Grow to Greatness: Smart Growth for Private Businesses, Part I
University of Virginia via Coursera
Designing and Executing Information Security Strategies
University of Washington via Coursera
Retos de la agricultura y la alimentación en el siglo XXI
Miríadax
Ressources naturelles et développement durable
Université catholique de Louvain via edX
Innovating in Health Care
Harvard University via edX