Defense-in-depth: A recipe for logic locking to prevail

MT Rahman, MS Rahman, H Wang, S Tajik, W Khalil… - Integration, 2020 - Elsevier
Logic locking/obfuscation has emerged as an auspicious solution for protecting the
semiconductor intellectual property (IP) from the untrusted entities in the design and …

Provably-secure logic locking: From theory to practice

M Yasin, A Sengupta, MT Nabeel, M Ashraf… - Proceedings of the …, 2017 - dl.acm.org
Logic locking has been conceived as a promising proactive defense strategy against
intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and …

A comprehensive survey on non-invasive fault injection attacks

AM Shuvo, T Zhang, F Farahmandi… - Cryptology ePrint …, 2023 - eprint.iacr.org
Non-invasive fault injection attacks have emerged as significant threats to a spectrum of
microelectronic systems ranging from commodity devices to high-end customized …

Keynote: A disquisition on logic locking

A Chakraborty, NG Jayasankaran, Y Liu… - … on Computer-Aided …, 2019 - ieeexplore.ieee.org
The fabless business model has given rise to many security threats, including piracy of
intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and …

The key is left under the mat: On the inappropriate security assumption of logic locking schemes

MT Rahman, S Tajik, MS Rahman… - … Security and Trust …, 2020 - ieeexplore.ieee.org
Logic locking has been proposed as an obfuscation technique to protect outsourced IC
designs from IP piracy by untrusted entities in the design and fabrication process. In this …

PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications

Y Zheng, W Liu, C Gu, CH Chang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Peer to Peer (P2P) or direct connection IoT has become increasingly popular owing to its
lower latency and higher privacy compared to database-driven or server-based IoT …

Design guidelines and feedback structure of ring oscillator PUF for performance improvement

Z Huang, J Bian, Y Lin, H Liang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The physical unclonable function (PUF) is a hardware security primitive that is used to
generate secret keys or identity authentication for chips using random manufacturing …

Physical inspection & attacks: New frontier in hardware security

MT Rahman, Q Shi, S Tajik, H Shen… - 2018 IEEE 3rd …, 2018 - ieeexplore.ieee.org
Due to globalization, the semiconductor industry is becoming more susceptible to trust and
security issues. Hardware Trojans, ie, malicious modification to integrated circuits (ICs), can …

Strong machine learning attack against PUFs with no mathematical model

F Ganji, S Tajik, F Fäßler, JP Seifert - … , Santa Barbara, CA, USA, August 17 …, 2016 - Springer
Although numerous attacks revealed the vulnerability of different PUF families to non-
invasive Machine Learning (ML) attacks, the question is still open whether all PUFs might be …

Hardware obfuscation using PUF-based logic

JB Wendt, M Potkonjak - 2014 IEEE/ACM International …, 2014 - ieeexplore.ieee.org
There is a great need to develop universal and robust techniques for intellectual property
protection of integrated circuits. In this paper, we introduce techniques for the obfuscation of …