Fun-SAT: Functional corruptibility-guided SAT-based attack on sequential logic encryption
The SAT attack has shown to be efficient against most combinational logic encryption
methods. It can be extended to attack sequential logic encryption techniques by leveraging …
methods. It can be extended to attack sequential logic encryption techniques by leveraging …
SAIL: Analyzing structural artifacts of logic locking using machine learning
Obfuscation or Logic locking (LL) is a technique for protecting hardware intellectual property
(IP) blocks against diverse threats, including IP theft, reverse engineering, and malicious …
(IP) blocks against diverse threats, including IP theft, reverse engineering, and malicious …
On the security of sequential logic locking against oracle-guided attacks
The Boolean satisfiability (SAT) attack is an oracle-guided attack that can break most
combinational logic locking schemes by efficiently pruning out all the wrong keys from the …
combinational logic locking schemes by efficiently pruning out all the wrong keys from the …
LeGO: A learning-guided obfuscation framework for hardware IP protection
A Alaql, S Chattopadhyay… - … on Computer-Aided …, 2021 - ieeexplore.ieee.org
The security of hardware intellectual properties (IPs) has become a significant concern, as
the opportunity for piracy, reverse engineering, and malicious modification is increasing …
the opportunity for piracy, reverse engineering, and malicious modification is increasing …
Security-driven metrics and models for efficient evaluation of logic encryption schemes
Research in logic encryption over the last decade has resulted in various techniques to
prevent different security threats such as Trojan insertion, intellectual property leakage, and …
prevent different security threats such as Trojan insertion, intellectual property leakage, and …
Breaking the design and security trade-off of look-up-table–based obfuscation
Logic locking and Integrated Circuit (IC) camouflaging are the most prevalent protection
schemes that can thwart most hardware security threats. However, the state-of-the-art …
schemes that can thwart most hardware security threats. However, the state-of-the-art …
Design of secure and robust cognitive system for malware detection
S Shukla - arXiv preprint arXiv:2208.02310, 2022 - arxiv.org
Machine learning based malware detection techniques rely on grayscale images of malware
and tends to classify malware based on the distribution of textures in graycale images. Albeit …
and tends to classify malware based on the distribution of textures in graycale images. Albeit …
SANSCrypt: A sporadic-authentication-based sequential logic encryption scheme
We propose SANSCrypt, a novel sequential logic encryption scheme to protect integrated
circuits against reverse engineering. Previous sequential encryption methods focus on …
circuits against reverse engineering. Previous sequential encryption methods focus on …
SANSCrypt: Sporadic-authentication-based sequential logic encryption
Sequential logic encryption is a countermeasure against reverse engineering of sequential
circuits based on modifying the original finite state machine of the circuit such that the circuit …
circuits based on modifying the original finite state machine of the circuit such that the circuit …
[图书][B] Re-imagining the Security of the Hardware using Lookup Table based Obfuscation
G Kolhe - 2022 - search.proquest.com
The increasing cost of manufacturing the complex Integrated Circuits (ICs) and ever-rising
competition to shorten time-to-market have given rise to the trend of fabless manufacturing …
competition to shorten time-to-market have given rise to the trend of fabless manufacturing …