{INSIGHT}: Attacking {Industry-Adopted} Learning Resilient Logic Locking Techniques Using Explainable Graph Neural Network

LL Mankali, O Sinanoglu, S Patnaik - 33rd USENIX Security Symposium …, 2024 - usenix.org
Logic locking is a hardware-based solution that protects against hardware intellectual
property (IP) piracy. With the advent of powerful machine learning (ML)-based attacks, in the …

Hardware Honeypot: Setting Sequential Reverse Engineering on a Wrong Track

M Brunner, HH Lee, A Hepp, J Baehr… - 2024 27th International …, 2024 - ieeexplore.ieee.org
Reverse engineering (RE) of finite state machines (FSMs) is a serious threat when
protecting designs against RE attacks. While most recent protection techniques rely on the …

DECOR: Enhancing Logic Locking Against Machine Learning-Based Attacks

Y Hu, K Yang, SD Chowdhury… - 2024 25th International …, 2024 - ieeexplore.ieee.org
Logic locking (LL) has gained attention as a promising intellectual property protection
measure for integrated circuits. However, recent attacks, facilitated by machine learning …

Flip-Lock: A Flip-Flop-Based Logic Locking Technique for Thwarting ML-based and Algorithmic Structural Attacks

A Darjani, N Kavand, A Kumar - … of the Great Lakes Symposium on VLSI …, 2024 - dl.acm.org
Machine learning (ML) and algorithmic structural attacks have highlighted the possibility of
utilizing structural leakages of an obfuscated circuit to reverse engineer the locking …

New Perspectives on Sequential Reverse Engineering and Obfuscation

MF Brunner - 2024 - mediatum.ub.tum.de
This thesis contributes to protecting the chips' intellectual property by taking a novel
perspective on sequential reverse engineering and obfuscation. It derives a novel …

Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses

SD Chowdhury - 2024 - search.proquest.com
The burgeoning costs of integrated circuit (IC) fabrication have led to widespread
globalization of the IC supply chain, exposing IC designs to hardware security threats like …