Advances in logic locking: Past, present, and prospects
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …
Logic locking for IP security: A comprehensive analysis on challenges, techniques, and trends
A substantial part of the Integrated Circuit (IC) supply chain that involves semiconductor
fabrication, packaging, and testing has shifted globally to minimize IC costs and satisfy …
fabrication, packaging, and testing has shifted globally to minimize IC costs and satisfy …
ReTrustFSM: toward RTL hardware obfuscation-a hybrid FSM approach
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain
threats, ie, IP piracy and overproduction. Many studies have evaluated numerous …
threats, ie, IP piracy and overproduction. Many studies have evaluated numerous …
RANE: An open-source formal de-obfuscation attack for reverse engineering of logic encrypted circuits
S Roshanisefat, H Mardani Kamali… - Proceedings of the …, 2021 - dl.acm.org
To enable trust in the IC supply chain, logic locking as an IP protection technique received
significant attention in recent years. Over the years, by utilizing Boolean satisfiability (SAT) …
significant attention in recent years. Over the years, by utilizing Boolean satisfiability (SAT) …
On the difficulty of FSM-based hardware obfuscation
M Fyrbiak, S Wallat, J Déchelotte, N Albartus… - IACR Transactions on …, 2018 - tches.iacr.org
Abstract In today's Integrated Circuit (IC) production chains, a designer's valuable
Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to …
Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to …
Fun-SAT: Functional corruptibility-guided SAT-based attack on sequential logic encryption
The SAT attack has shown to be efficient against most combinational logic encryption
methods. It can be extended to attack sequential logic encryption techniques by leveraging …
methods. It can be extended to attack sequential logic encryption techniques by leveraging …
Practical Implementation of robust state-space obfuscation for hardware IP protection
Hardware obfuscation is a design transformation technique that transforms a design to
protect its confidentiality against untrusted parties. In particular, it aims at protecting …
protect its confidentiality against untrusted parties. In particular, it aims at protecting …
Hardware security exploiting post-CMOS devices: fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing
hardware-oriented security and trust. However, implementing hardware security primitives …
hardware-oriented security and trust. However, implementing hardware security primitives …
Emerging attacks on logic locking in SFQ circuits and related countermeasures
Hardware security in single flux quantum (SFQ) circuits is an emerging research area due
the increasing demand of data centers operating with sensitive information and the limited …
the increasing demand of data centers operating with sensitive information and the limited …
Complexity analysis of the SAT attack on logic locking
Due to the adoption of horizontal business models following the globalization of
semiconductor manufacturing, the overproduction of integrated circuits (ICs) and the piracy …
semiconductor manufacturing, the overproduction of integrated circuits (ICs) and the piracy …