Fun-SAT: Functional corruptibility-guided SAT-based attack on sequential logic encryption

Y Hu, Y Zhang, K Yang, D Chen… - … Security and Trust …, 2021 - ieeexplore.ieee.org
The SAT attack has shown to be efficient against most combinational logic encryption
methods. It can be extended to attack sequential logic encryption techniques by leveraging …

SAIL: Analyzing structural artifacts of logic locking using machine learning

P Chakraborty, J Cruz, A Alaql… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Obfuscation or Logic locking (LL) is a technique for protecting hardware intellectual property
(IP) blocks against diverse threats, including IP theft, reverse engineering, and malicious …

On the security of sequential logic locking against oracle-guided attacks

Y Hu, Y Zhang, K Yang, D Chen… - … on Computer-Aided …, 2023 - ieeexplore.ieee.org
The Boolean satisfiability (SAT) attack is an oracle-guided attack that can break most
combinational logic locking schemes by efficiently pruning out all the wrong keys from the …

LeGO: A learning-guided obfuscation framework for hardware IP protection

A Alaql, S Chattopadhyay… - … on Computer-Aided …, 2021 - ieeexplore.ieee.org
The security of hardware intellectual properties (IPs) has become a significant concern, as
the opportunity for piracy, reverse engineering, and malicious modification is increasing …

Security-driven metrics and models for efficient evaluation of logic encryption schemes

Y Hu, VV Menon, A Schmidt, J Monson… - Proceedings of the 17th …, 2019 - dl.acm.org
Research in logic encryption over the last decade has resulted in various techniques to
prevent different security threats such as Trojan insertion, intellectual property leakage, and …

Breaking the design and security trade-off of look-up-table–based obfuscation

G Kolhe, TD Sheaves, H Mahmoodi… - ACM Transactions on …, 2022 - dl.acm.org
Logic locking and Integrated Circuit (IC) camouflaging are the most prevalent protection
schemes that can thwart most hardware security threats. However, the state-of-the-art …

Design of secure and robust cognitive system for malware detection

S Shukla - arXiv preprint arXiv:2208.02310, 2022 - arxiv.org
Machine learning based malware detection techniques rely on grayscale images of malware
and tends to classify malware based on the distribution of textures in graycale images. Albeit …

SANSCrypt: A sporadic-authentication-based sequential logic encryption scheme

Y Hu, K Yang, S Nazarian… - 2020 IFIP/IEEE 28th …, 2020 - ieeexplore.ieee.org
We propose SANSCrypt, a novel sequential logic encryption scheme to protect integrated
circuits against reverse engineering. Previous sequential encryption methods focus on …

SANSCrypt: Sporadic-authentication-based sequential logic encryption

Y Hu, K Yang, S Nazarian, P Nuzzo - VLSI-SoC: Design Trends: 28th IFIP …, 2021 - Springer
Sequential logic encryption is a countermeasure against reverse engineering of sequential
circuits based on modifying the original finite state machine of the circuit such that the circuit …

[图书][B] Re-imagining the Security of the Hardware using Lookup Table based Obfuscation

G Kolhe - 2022 - search.proquest.com
The increasing cost of manufacturing the complex Integrated Circuits (ICs) and ever-rising
competition to shorten time-to-market have given rise to the trend of fabless manufacturing …