Research Directions for Verifiable Crypto-Physically Secure TEEs

S Bellemare - arXiv preprint arXiv:2410.03183, 2024 - arxiv.org
A niche corner of the Web3 world is increasingly making use of hardware-based Trusted
Execution Environments (TEEs) to build decentralized infrastructure. One of the motivations …

Trustworthy hardware design with logic locking

D Sisejkovic, R Leupers - … on Very Large Scale Integration (VLSI …, 2021 - ieeexplore.ieee.org
As the designated root of trust, hardware is undoubtedly the most critical layer to security in
modern electronic systems. Protecting its integrity throughout the integrated circuit supply …

Lockit: A Logic Locking Automation Software

N Kajtez, Y Zhang, B Halak - Electronics, 2021 - mdpi.com
The significant rise in the cost of manufacturing nanoscale integrated circuits (ICs) has led
the majority of IC design companies to outsource the fabrication of their products to other …

Security Metrics: One Problem, Many Dimensions

D Sisejkovic, R Leupers - Logic Locking: A Practical Approach to Secure …, 2022 - Springer
Despite the great efforts invested in designing resilient schemes, the versatile security
properties of logic locking make it notoriously difficult to define usable and comprehensive …

Protecting the integrity of processor cores with logic encryption

D Ŝiŝejković, F Merchant… - 2019 32nd IEEE …, 2019 - ieeexplore.ieee.org
Malicious circuit modifications known as hardware Trojans represent a rising threat to the
integrated circuit supply chain. Logic encryption has emerged as a prominent technique for …

Sicherheitsmetriken: Ein Problem, viele Dimensionen

D Sisejkovic, R Leupers - Logic Locking: Ein praktischer Ansatz für sichere …, 2024 - Springer
Trotz der großen Anstrengungen, die in die Gestaltung widerstandsfähiger Schemata
investiert wurden, machen die vielseitigen Sicherheitseigenschaften des Logic Lockings es …

Logic Locking

A subtle change that leads to disastrous consequences—hardware Trojans undoubtedly
pose one of the greatest security threats to the modern age. How to protect hardware against …

[PDF][PDF] Designing trustworthy hardware with logic locking

D Šišejković - scholar.archive.org
From smartphones and laptops to automotive, medical, and defense applications,
microelectronic devices are deeply anchored in the modern way of life. This everincreasing …