ReIGNN: State register identification using graph neural networks for circuit reverse engineering
Reverse engineering an integrated circuit netlist is a powerful tool to help detect malicious
logic and counteract design piracy. A critical challenge in this domain is the correct …
logic and counteract design piracy. A critical challenge in this domain is the correct …
Fun-SAT: Functional corruptibility-guided SAT-based attack on sequential logic encryption
The SAT attack has shown to be efficient against most combinational logic encryption
methods. It can be extended to attack sequential logic encryption techniques by leveraging …
methods. It can be extended to attack sequential logic encryption techniques by leveraging …
On the security of sequential logic locking against oracle-guided attacks
The Boolean satisfiability (SAT) attack is an oracle-guided attack that can break most
combinational logic locking schemes by efficiently pruning out all the wrong keys from the …
combinational logic locking schemes by efficiently pruning out all the wrong keys from the …
Similarity-Based Logic Locking Against Machine Learning Attacks
Logic locking is a promising technique for protecting integrated circuit designs while
outsourcing their fabrication. Recently, graph neural network (GNN)-based link prediction …
outsourcing their fabrication. Recently, graph neural network (GNN)-based link prediction …
TriLock: IC protection with tunable corruptibility and resilience to SAT and removal attacks
Sequential logic locking has been studied over the last decade as a method to protect
sequential circuits from reverse engineering. However, most of the existing sequential logic …
sequential circuits from reverse engineering. However, most of the existing sequential logic …
DECOR: Enhancing Logic Locking Against Machine Learning-Based Attacks
Logic locking (LL) has gained attention as a promising intellectual property protection
measure for integrated circuits. However, recent attacks, facilitated by machine learning …
measure for integrated circuits. However, recent attacks, facilitated by machine learning …
SANSCrypt: Sporadic-authentication-based sequential logic encryption
Sequential logic encryption is a countermeasure against reverse engineering of sequential
circuits based on modifying the original finite state machine of the circuit such that the circuit …
circuits based on modifying the original finite state machine of the circuit such that the circuit …
Late Breaking Results: On the One-Key Premise of Logic Locking
Y Hu, H Cherupalli, M Borza… - Proceedings of the 61st …, 2024 - dl.acm.org
The evaluation of logic locking methods has long been predicated on an implicit assumption
that only the correct key can unveil the true functionality of a protected circuit. Consequently …
that only the correct key can unveil the true functionality of a protected circuit. Consequently …
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses
SD Chowdhury - 2024 - search.proquest.com
The burgeoning costs of integrated circuit (IC) fabrication have led to widespread
globalization of the IC supply chain, exposing IC designs to hardware security threats like …
globalization of the IC supply chain, exposing IC designs to hardware security threats like …
Security-Driven Design of Logic Locking Schemes: Metrics, Attacks, and Defenses
Y Hu - 2022 - search.proquest.com
Logic locking has gained significant attention, over the past decade, as a promising solution
to prevent the reverse-engineering of integrated circuits (ICs) by malicious third-party …
to prevent the reverse-engineering of integrated circuits (ICs) by malicious third-party …