Discuss different methods for RTL obfuscation.
1. Describe the two methods of node-locking FPGA bitstream, and compare their main differences.
2. Suppose a 2-input XOR function mapped to a 3-input LUT (Fig. 14.13A) is obfuscated with an additional key K (Fig. 14.13B). What could be the value of the bitstream that renders the XOR function for the correct key, K = 0? If a wrong key is applied, the function is inverted. Write the 8 bits in the following sequence: Bit111------- Bit000
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here