Satisfiability attack-resistant camouflaged two-dimensional heterostructure devices
Reverse engineering (RE) is one of the major security threats to the semiconductor industry
due to the involvement of untrustworthy parties in an increasingly globalized chip …
due to the involvement of untrustworthy parties in an increasingly globalized chip …
Logic locking at the frontiers of machine learning: A survey on developments and opportunities
In the past decade, a lot of progress has been made in the design and evaluation of logic
locking; a premier technique to safeguard the integrity of integrated circuits throughout the …
locking; a premier technique to safeguard the integrity of integrated circuits throughout the …
A survey and perspective on artificial intelligence for security-aware electronic design automation
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly
used in several fields to improve performance and the level of automation. In recent years …
used in several fields to improve performance and the level of automation. In recent years …
Digitally assisted mixed-signal circuit security
The design and manufacturing steps of a chip typically involve several parties. For example,
a chip may comprise several third-party intellectual property (IP) cores and the integrated …
a chip may comprise several third-party intellectual property (IP) cores and the integrated …
Anti-piracy design of RF transceivers
AR Díaz-Rizo, H Aboushady… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We present a locking-based design-for-security methodology to prevent piracy of RF
transceiver integrated circuits. The solution is called SyncLock as it locks the …
transceiver integrated circuits. The solution is called SyncLock as it locks the …
RF transceiver security against piracy attacks
ARD Rizo, J Leonhard, H Aboushady… - … on Circuits and …, 2022 - ieeexplore.ieee.org
We demonstrate for the first time system-level locking for RF transceivers serving as an anti-
piracy security technique. The locking strategy is to make RF performance key-dependent by …
piracy security technique. The locking strategy is to make RF performance key-dependent by …
Locking by untuning: A lock-less approach for analog and mixed-signal IC security
We propose an antipiracy security approach for programmable analog and mixed-signal
(AMS) integrated circuits (ICs). The security approach relies on functionality locking by …
(AMS) integrated circuits (ICs). The security approach relies on functionality locking by …
Chaogate parameter optimization using bayesian optimization and genetic algorithm
RY Acharya, NF Charlot, MM Alam… - … on Quality Electronic …, 2021 - ieeexplore.ieee.org
Chaotic circuits have found application in various research areas, including cryptography.
However, more effort has to be made to achieve the properties required for such circuits …
However, more effort has to be made to achieve the properties required for such circuits …
Analog/RF IP protection: Attack models, defense techniques, and challenges
A Sanabria-Borbón, NG Jayasankaran… - … on Circuits and …, 2020 - ieeexplore.ieee.org
The globalized and distributed semiconductor supply chain exposes the integrated circuits
to security threats. These threats can target the circuit functionality, the secret data …
to security threats. These threats can target the circuit functionality, the secret data …
Anti-piracy of analog and mixed-signal circuits in FD-SOI
M Tlili, A Sayed, D Mahmoud… - 2022 27th Asia and …, 2022 - ieeexplore.ieee.org
We propose an anti-piracy security technique based on locking for analog and mixed-signal
circuits designed in FD-SOI. We show that obfuscating the body-bias voltages of tunable …
circuits designed in FD-SOI. We show that obfuscating the body-bias voltages of tunable …