IP protection and supply chain security through logic obfuscation: A systematic overview
The globalization of the semiconductor supply chain introduces ever-increasing security and
privacy risks. Two major concerns are IP theft through reverse engineering and malicious …
privacy risks. Two major concerns are IP theft through reverse engineering and malicious …
Defense-in-depth: A recipe for logic locking to prevail
Logic locking/obfuscation has emerged as an auspicious solution for protecting the
semiconductor intellectual property (IP) from the untrusted entities in the design and …
semiconductor intellectual property (IP) from the untrusted entities in the design and …
FPGA-based remote power side-channel attacks
The rapid adoption of heterogeneous computing has driven the integration of Field
Programmable Gate Arrays (FPGAs) into cloud datacenters and flexible System-on-Chips …
Programmable Gate Arrays (FPGAs) into cloud datacenters and flexible System-on-Chips …
The unpatchable silicon: a full break of the bitstream encryption of xilinx 7-series {FPGAs}
The security of FPGAs is a crucial topic, as any vulnerability within the hardware can have
severe consequences, if they are used in a secure design. Since FPGA designs are …
severe consequences, if they are used in a secure design. Since FPGA designs are …
The key is left under the mat: On the inappropriate security assumption of logic locking schemes
Logic locking has been proposed as an obfuscation technique to protect outsourced IC
designs from IP piracy by untrusted entities in the design and fabrication process. In this …
designs from IP piracy by untrusted entities in the design and fabrication process. In this …
Key extraction using thermal laser stimulation: A case study on xilinx ultrascale fpgas
Thermal laser stimulation (TLS) is a failure analysis technique, which can be deployed by an
adversary to localize and read out stored secrets in the SRAM of a chip. To this date, a few …
adversary to localize and read out stored secrets in the SRAM of a chip. To this date, a few …
Physical inspection & attacks: New frontier in hardware security
Due to globalization, the semiconductor industry is becoming more susceptible to trust and
security issues. Hardware Trojans, ie, malicious modification to integrated circuits (ICs), can …
security issues. Hardware Trojans, ie, malicious modification to integrated circuits (ICs), can …
Security and privacy in the emerging cyber-physical world: A survey
With the emergence of low-cost smart and connected IoT devices, the area of cyber-physical
security is becoming increasingly important. Past research has demonstrated new threat …
security is becoming increasingly important. Past research has demonstrated new threat …
Does logic locking work with {EDA} tools?
Logic locking is a promising solution against emerging hardware security threats, which
entails protecting a Boolean circuit using a “keying” mechanism. The latest and hitherto …
entails protecting a Boolean circuit using a “keying” mechanism. The latest and hitherto …
Real-world snapshots vs. theory: Questioning the t-probing security model
Due to its sound theoretical basis and practical efficiency, masking has become the most
prominent countermeasure to protect cryptographic implementations against physical side …
prominent countermeasure to protect cryptographic implementations against physical side …