IP protection and supply chain security through logic obfuscation: A systematic overview
The globalization of the semiconductor supply chain introduces ever-increasing security and
privacy risks. Two major concerns are IP theft through reverse engineering and malicious …
privacy risks. Two major concerns are IP theft through reverse engineering and malicious …
The key is left under the mat: On the inappropriate security assumption of logic locking schemes
Logic locking has been proposed as an obfuscation technique to protect outsourced IC
designs from IP piracy by untrusted entities in the design and fabrication process. In this …
designs from IP piracy by untrusted entities in the design and fabrication process. In this …
On the power of optical contactless probing: Attacking bitstream encryption of FPGAs
Modern Integrated Circuits (ICs) employ several classes of countermeasures to mitigate
physical attacks. Recently, a powerful semi-invasive attack relying on optical contactless …
physical attacks. Recently, a powerful semi-invasive attack relying on optical contactless …
Protect your chip design intellectual property: An overview
The increasing cost of integrated circuit (IC) fabrication has driven most companies to" go
fabless" over time. The corresponding outsourcing trend gave rise to various attack vectors …
fabless" over time. The corresponding outsourcing trend gave rise to various attack vectors …
Real-world snapshots vs. theory: Questioning the t-probing security model
Due to its sound theoretical basis and practical efficiency, masking has become the most
prominent countermeasure to protect cryptographic implementations against physical side …
prominent countermeasure to protect cryptographic implementations against physical side …
Cross-lock: Dense layout-level interconnect locking using cross-bar architectures
Logic locking is an attractive defense against a series of hardware security threats. However,
oracle guided attacks based on advanced Boolean reasoning engines such as SAT, ATPG …
oracle guided attacks based on advanced Boolean reasoning engines such as SAT, ATPG …
Automatic Extraction of Secrets from the Transistor Jungle using {Laser-Assisted}{Side-Channel} Attacks
The security of modern electronic devices relies on secret keys stored on secure hardware
modules as the root-of-trust (RoT). Extracting those keys would break the security of the …
modules as the root-of-trust (RoT). Extracting those keys would break the security of the …
Security closure of physical layouts ICCAD special session paper
Computer-aided design (CAD) tools traditionally optimize for power, performance, and area
(PPA). However, given a vast number of hardware security threats, we call for secure-by …
(PPA). However, given a vast number of hardware security threats, we call for secure-by …
Nanopyramid: An optical scrambler against backside probing attacks
H Shen, N Asadizanjani… - … for Testing and …, 2018 - dl.asminternational.org
Optical probing from the backside of an integrated circuit (IC) is a powerful failure analysis
technique but raises serious security concerns when in the hands of attackers. For instance …
technique but raises serious security concerns when in the hands of attackers. For instance …
Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices
The era of widespread globalization has led to the emergence of hardware-centric security
threats throughout the IC supply chain. Prior defenses like logic locking, layout …
threats throughout the IC supply chain. Prior defenses like logic locking, layout …