Defense-in-depth: A recipe for logic locking to prevail
Logic locking/obfuscation has emerged as an auspicious solution for protecting the
semiconductor intellectual property (IP) from the untrusted entities in the design and …
semiconductor intellectual property (IP) from the untrusted entities in the design and …
Provably-secure logic locking: From theory to practice
Logic locking has been conceived as a promising proactive defense strategy against
intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and …
intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and …
A comprehensive survey on non-invasive fault injection attacks
Non-invasive fault injection attacks have emerged as significant threats to a spectrum of
microelectronic systems ranging from commodity devices to high-end customized …
microelectronic systems ranging from commodity devices to high-end customized …
Keynote: A disquisition on logic locking
The fabless business model has given rise to many security threats, including piracy of
intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and …
intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and …
The key is left under the mat: On the inappropriate security assumption of logic locking schemes
Logic locking has been proposed as an obfuscation technique to protect outsourced IC
designs from IP piracy by untrusted entities in the design and fabrication process. In this …
designs from IP piracy by untrusted entities in the design and fabrication process. In this …
PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications
Peer to Peer (P2P) or direct connection IoT has become increasingly popular owing to its
lower latency and higher privacy compared to database-driven or server-based IoT …
lower latency and higher privacy compared to database-driven or server-based IoT …
Design guidelines and feedback structure of ring oscillator PUF for performance improvement
Z Huang, J Bian, Y Lin, H Liang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The physical unclonable function (PUF) is a hardware security primitive that is used to
generate secret keys or identity authentication for chips using random manufacturing …
generate secret keys or identity authentication for chips using random manufacturing …
Physical inspection & attacks: New frontier in hardware security
Due to globalization, the semiconductor industry is becoming more susceptible to trust and
security issues. Hardware Trojans, ie, malicious modification to integrated circuits (ICs), can …
security issues. Hardware Trojans, ie, malicious modification to integrated circuits (ICs), can …
Strong machine learning attack against PUFs with no mathematical model
Although numerous attacks revealed the vulnerability of different PUF families to non-
invasive Machine Learning (ML) attacks, the question is still open whether all PUFs might be …
invasive Machine Learning (ML) attacks, the question is still open whether all PUFs might be …
Hardware obfuscation using PUF-based logic
JB Wendt, M Potkonjak - 2014 IEEE/ACM International …, 2014 - ieeexplore.ieee.org
There is a great need to develop universal and robust techniques for intellectual property
protection of integrated circuits. In this paper, we introduce techniques for the obfuscation of …
protection of integrated circuits. In this paper, we introduce techniques for the obfuscation of …