Keynote: A disquisition on logic locking
The fabless business model has given rise to many security threats, including piracy of
intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and …
intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and …
Review on logic locking attacks in hardware security
JJ Rinsy, NM Sivamangai… - … on Devices, Circuits …, 2022 - ieeexplore.ieee.org
Increasing threats involving hardware Trojans, intellectual property, piracy, reverse
engineering and industrialization of semiconductor technology have forced semiconductor …
engineering and industrialization of semiconductor technology have forced semiconductor …
Design of INV/BUFF Logic Locking For Enhancing the Hardware Security
R Naveenkumar, NM Sivamangai, A Napolean… - Journal of Electronic …, 2023 - Springer
An increasingly popular method for defending an integrated circuit (IC) against theft, excess
production, and the Hardware Trojans (HT) is logic locking. The majority of popular logical …
production, and the Hardware Trojans (HT) is logic locking. The majority of popular logical …
ALT-Lock: Logic and Timing Ambiguity-Based IP Obfuscation Against Reverse Engineering
We present a logic ambiguity-based intellectual property (IP) obfuscation method that
replaces traditional key gates with key-controlled functionally ambiguous logic gates, called …
replaces traditional key gates with key-controlled functionally ambiguous logic gates, called …
A BIST-based dynamic Obfuscation scheme for resilience against removal and Oracle-guided attacks
BISTLock is a recently proposed logic-locking technique that integrates a barrier finite-state-
machine (FSM) with the built-in self-test (BIST) controller. We demonstrate the vulnerability …
machine (FSM) with the built-in self-test (BIST) controller. We demonstrate the vulnerability …
BISTLock: Efficient IP piracy protection using BIST
The globalization of IC manufacturing has increased the likelihood for IP providers to suffer
financial and reputational loss from IP piracy. Logic locking prevents IP piracy by corrupting …
financial and reputational loss from IP piracy. Logic locking prevents IP piracy by corrupting …
New Perspectives on Sequential Reverse Engineering and Obfuscation
MF Brunner - 2024 - mediatum.ub.tum.de
This thesis contributes to protecting the chips' intellectual property by taking a novel
perspective on sequential reverse engineering and obfuscation. It derives a novel …
perspective on sequential reverse engineering and obfuscation. It derives a novel …
Hardware Obfuscation for Finite Field Algorithms
AA Sharma - 2018 - tigerprints.clemson.edu
With the rise of computing devices, the security robustness of the devices has become of
utmost importance. Companies invest huge sums of money, time and effort in security …
utmost importance. Companies invest huge sums of money, time and effort in security …