IP protection and supply chain security through logic obfuscation: A systematic overview

K Shamsi, M Li, K Plaks, S Fazzari, DZ Pan… - ACM Transactions on …, 2019 - dl.acm.org
The globalization of the semiconductor supply chain introduces ever-increasing security and
privacy risks. Two major concerns are IP theft through reverse engineering and malicious …

The key is left under the mat: On the inappropriate security assumption of logic locking schemes

MT Rahman, S Tajik, MS Rahman… - … Security and Trust …, 2020 - ieeexplore.ieee.org
Logic locking has been proposed as an obfuscation technique to protect outsourced IC
designs from IP piracy by untrusted entities in the design and fabrication process. In this …

On the power of optical contactless probing: Attacking bitstream encryption of FPGAs

S Tajik, H Lohrke, JP Seifert, C Boit - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
Modern Integrated Circuits (ICs) employ several classes of countermeasures to mitigate
physical attacks. Recently, a powerful semi-invasive attack relying on optical contactless …

Protect your chip design intellectual property: An overview

J Knechtel, S Patnaik, O Sinanoglu - Proceedings of the International …, 2019 - dl.acm.org
The increasing cost of integrated circuit (IC) fabrication has driven most companies to" go
fabless" over time. The corresponding outsourcing trend gave rise to various attack vectors …

Real-world snapshots vs. theory: Questioning the t-probing security model

T Krachenfels, F Ganji, A Moradi… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Due to its sound theoretical basis and practical efficiency, masking has become the most
prominent countermeasure to protect cryptographic implementations against physical side …

Cross-lock: Dense layout-level interconnect locking using cross-bar architectures

K Shamsi, M Li, DZ Pan, Y Jin - Proceedings of the 2018 on Great Lakes …, 2018 - dl.acm.org
Logic locking is an attractive defense against a series of hardware security threats. However,
oracle guided attacks based on advanced Boolean reasoning engines such as SAT, ATPG …

Automatic Extraction of Secrets from the Transistor Jungle using {Laser-Assisted}{Side-Channel} Attacks

T Krachenfels, T Kiyan, S Tajik, JP Seifert - 30th USENIX security …, 2021 - usenix.org
The security of modern electronic devices relies on secret keys stored on secure hardware
modules as the root-of-trust (RoT). Extracting those keys would break the security of the …

Security closure of physical layouts ICCAD special session paper

J Knechtel, J Gopinath, J Bhandari… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Computer-aided design (CAD) tools traditionally optimize for power, performance, and area
(PPA). However, given a vast number of hardware security threats, we call for secure-by …

Nanopyramid: An optical scrambler against backside probing attacks

H Shen, N Asadizanjani… - … for Testing and …, 2018 - dl.asminternational.org
Optical probing from the backside of an integrated circuit (IC) is a powerful failure analysis
technique but raises serious security concerns when in the hands of attackers. For instance …

Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices

N Rangarajan, S Patnaik, J Knechtel… - … on Emerging Topics …, 2020 - ieeexplore.ieee.org
The era of widespread globalization has led to the emergence of hardware-centric security
threats throughout the IC supply chain. Prior defenses like logic locking, layout …