ReIGNN: State register identification using graph neural networks for circuit reverse engineering

SD Chowdhury, K Yang, P Nuzzo - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Reverse engineering an integrated circuit netlist is a powerful tool to help detect malicious
logic and counteract design piracy. A critical challenge in this domain is the correct …

Fun-SAT: Functional corruptibility-guided SAT-based attack on sequential logic encryption

Y Hu, Y Zhang, K Yang, D Chen… - … Security and Trust …, 2021 - ieeexplore.ieee.org
The SAT attack has shown to be efficient against most combinational logic encryption
methods. It can be extended to attack sequential logic encryption techniques by leveraging …

On the security of sequential logic locking against oracle-guided attacks

Y Hu, Y Zhang, K Yang, D Chen… - … on Computer-Aided …, 2023 - ieeexplore.ieee.org
The Boolean satisfiability (SAT) attack is an oracle-guided attack that can break most
combinational logic locking schemes by efficiently pruning out all the wrong keys from the …

Similarity-Based Logic Locking Against Machine Learning Attacks

SD Chowdhury, K Yang, P Nuzzo - arXiv preprint arXiv:2305.05870, 2023 - arxiv.org
Logic locking is a promising technique for protecting integrated circuit designs while
outsourcing their fabrication. Recently, graph neural network (GNN)-based link prediction …

TriLock: IC protection with tunable corruptibility and resilience to SAT and removal attacks

Y Zhang, Y Hu, P Nuzzo… - 2022 Design, Automation & …, 2022 - ieeexplore.ieee.org
Sequential logic locking has been studied over the last decade as a method to protect
sequential circuits from reverse engineering. However, most of the existing sequential logic …

DECOR: Enhancing Logic Locking Against Machine Learning-Based Attacks

Y Hu, K Yang, SD Chowdhury… - 2024 25th International …, 2024 - ieeexplore.ieee.org
Logic locking (LL) has gained attention as a promising intellectual property protection
measure for integrated circuits. However, recent attacks, facilitated by machine learning …

SANSCrypt: Sporadic-authentication-based sequential logic encryption

Y Hu, K Yang, S Nazarian, P Nuzzo - VLSI-SoC: Design Trends: 28th IFIP …, 2021 - Springer
Sequential logic encryption is a countermeasure against reverse engineering of sequential
circuits based on modifying the original finite state machine of the circuit such that the circuit …

Late Breaking Results: On the One-Key Premise of Logic Locking

Y Hu, H Cherupalli, M Borza… - Proceedings of the 61st …, 2024 - dl.acm.org
The evaluation of logic locking methods has long been predicated on an implicit assumption
that only the correct key can unveil the true functionality of a protected circuit. Consequently …

Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses

SD Chowdhury - 2024 - search.proquest.com
The burgeoning costs of integrated circuit (IC) fabrication have led to widespread
globalization of the IC supply chain, exposing IC designs to hardware security threats like …

Security-Driven Design of Logic Locking Schemes: Metrics, Attacks, and Defenses

Y Hu - 2022 - search.proquest.com
Logic locking has gained significant attention, over the past decade, as a promising solution
to prevent the reverse-engineering of integrated circuits (ICs) by malicious third-party …