Obfuscation Benchmarks

The following resources are available for download:

  • A detailed description of obfuscation taxonomy used: download
  • An outline of the naming convention used for obfuscation benchmarks: download

To learn more about hardware obfuscation, please see Hardware Protection through Obfuscation (2017).

Showing All Benchmarks

Showing Results for Obfuscation Method

Showing Results for Sequential Obfuscation Method

Showing Results for Combinational Obfuscation Method

Showing Results for Single Modification Technique

Showing Results for Combinational Hybrid Obfuscation Techniques

Showing Results for SARLock

Showing Results for Characteristics

Showing Results for Obfuscated Netlist Size

Showing Results for #Gates < 1000

Showing Results for 5000 < #Gates

Showing Results for Key Size

Showing Results for Other Key Lengths