May 23, 2022, 1:20 a.m. | Giorgi Basiashvili, Zail Ul Abideen, Samuel Pagliarini

cs.CR updates on arXiv.org arxiv.org

Numerous security threats are emerging from untrusted players in the
integrated circuit (IC) ecosystem. Among them, reverse engineering practices
with the intent to counterfeit, overproduce, or modify an IC are worrying. In
recent years, various techniques have been proposed to mitigate the
aforementioned threats but no technique seems to be adequate to hide the
hierarchy of a design. Such ability to obfuscate the hierarchy is particularly
important for designs that contain repeated modules. In this paper, we propose
a novel …

digital hierarchy ip

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior InfoSec Manager - Risk and Compliance

@ Federal Reserve System | Remote - Virginia

Security Analyst

@ Fortra | Mexico

Incident Responder

@ Babcock | Chester, GB, CH1 6ER

Vulnerability, Access & Inclusion Lead

@ Monzo | Cardiff, London or Remote (UK)

Information Security Analyst

@ Unissant | MD, USA