Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a groundbreaking paper on hardware obfuscation techniques presented at CHES 2018. Delve into the concept of stealthy opaque predicates and their application in obfuscating constant expressions with minimal overhead. Learn about the authors' main contributions, examine case studies, and understand the implications for watermarking. Gain insights from the presentation's conclusion and participate in the audience question session to deepen your understanding of this innovative approach to hardware security.
Syllabus
Introduction
What is Obfuscation
Previous work
Main contribution
Case studies
Watermarking
Conclusion
Questions
Audience Question
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera