Keynote: A disquisition on logic locking

A Chakraborty, NG Jayasankaran, Y Liu… - … on Computer-Aided …, 2019 - ieeexplore.ieee.org
The fabless business model has given rise to many security threats, including piracy of
intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and …

Review on logic locking attacks in hardware security

JJ Rinsy, NM Sivamangai… - … on Devices, Circuits …, 2022 - ieeexplore.ieee.org
Increasing threats involving hardware Trojans, intellectual property, piracy, reverse
engineering and industrialization of semiconductor technology have forced semiconductor …

Design of INV/BUFF Logic Locking For Enhancing the Hardware Security

R Naveenkumar, NM Sivamangai, A Napolean… - Journal of Electronic …, 2023 - Springer
An increasingly popular method for defending an integrated circuit (IC) against theft, excess
production, and the Hardware Trojans (HT) is logic locking. The majority of popular logical …

ALT-Lock: Logic and Timing Ambiguity-Based IP Obfuscation Against Reverse Engineering

J Talukdar, WH Paik, E Ortega… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
We present a logic ambiguity-based intellectual property (IP) obfuscation method that
replaces traditional key gates with key-controlled functionally ambiguous logic gates, called …

A BIST-based dynamic Obfuscation scheme for resilience against removal and Oracle-guided attacks

J Talukdar, S Chen, A Das… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
BISTLock is a recently proposed logic-locking technique that integrates a barrier finite-state-
machine (FSM) with the built-in self-test (BIST) controller. We demonstrate the vulnerability …

BISTLock: Efficient IP piracy protection using BIST

S Chen, J Jung, P Song… - … IEEE International Test …, 2020 - ieeexplore.ieee.org
The globalization of IC manufacturing has increased the likelihood for IP providers to suffer
financial and reputational loss from IP piracy. Logic locking prevents IP piracy by corrupting …

New Perspectives on Sequential Reverse Engineering and Obfuscation

MF Brunner - 2024 - mediatum.ub.tum.de
This thesis contributes to protecting the chips' intellectual property by taking a novel
perspective on sequential reverse engineering and obfuscation. It derives a novel …

Hardware Obfuscation for Finite Field Algorithms

AA Sharma - 2018 - tigerprints.clemson.edu
With the rise of computing devices, the security robustness of the devices has become of
utmost importance. Companies invest huge sums of money, time and effort in security …