Fun-SAT: Functional corruptibility-guided SAT-based attack on sequential logic encryption
The SAT attack has shown to be efficient against most combinational logic encryption
methods. It can be extended to attack sequential logic encryption techniques by leveraging …
methods. It can be extended to attack sequential logic encryption techniques by leveraging …
On the security of sequential logic locking against oracle-guided attacks
The Boolean satisfiability (SAT) attack is an oracle-guided attack that can break most
combinational logic locking schemes by efficiently pruning out all the wrong keys from the …
combinational logic locking schemes by efficiently pruning out all the wrong keys from the …
DECOR: Enhancing Logic Locking Against Machine Learning-Based Attacks
Logic locking (LL) has gained attention as a promising intellectual property protection
measure for integrated circuits. However, recent attacks, facilitated by machine learning …
measure for integrated circuits. However, recent attacks, facilitated by machine learning …
SANSCrypt: Sporadic-authentication-based sequential logic encryption
Sequential logic encryption is a countermeasure against reverse engineering of sequential
circuits based on modifying the original finite state machine of the circuit such that the circuit …
circuits based on modifying the original finite state machine of the circuit such that the circuit …
LOTUS: A Scalable Framework to Lock Multi-Module Designs With One-Time Key and Self-Destructive Approaches
M Hashemi, S Mohammadi… - IEEE Embedded Systems …, 2024 - ieeexplore.ieee.org
The involvement of external parties in integrated circuits (IC) supply chain has raised
security issues such as cloning, overproduction, and unauthorized integration/activation …
security issues such as cloning, overproduction, and unauthorized integration/activation …
A Structural and SAT Analysis of SANSCrypt
As IP theft remains an important problem, and attacks against logic locking mechanisms are
becoming more sophisticated, the complexity of proposed encryption schemes are also …
becoming more sophisticated, the complexity of proposed encryption schemes are also …
New Perspectives on Sequential Reverse Engineering and Obfuscation
MF Brunner - 2024 - mediatum.ub.tum.de
This thesis contributes to protecting the chips' intellectual property by taking a novel
perspective on sequential reverse engineering and obfuscation. It derives a novel …
perspective on sequential reverse engineering and obfuscation. It derives a novel …
Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses
SD Chowdhury - 2024 - search.proquest.com
The burgeoning costs of integrated circuit (IC) fabrication have led to widespread
globalization of the IC supply chain, exposing IC designs to hardware security threats like …
globalization of the IC supply chain, exposing IC designs to hardware security threats like …
Measuring Security Metrics of Locked Circuits with Test
D Duvalsaint - 2022 - search.proquest.com
The development of integrated circuits (ICs) at smaller technology nodes has led to an
increase in fabrication costs. Consequently, many companies are outsourcing their …
increase in fabrication costs. Consequently, many companies are outsourcing their …
Security-Driven Design of Logic Locking Schemes: Metrics, Attacks, and Defenses
Y Hu - 2022 - search.proquest.com
Logic locking has gained significant attention, over the past decade, as a promising solution
to prevent the reverse-engineering of integrated circuits (ICs) by malicious third-party …
to prevent the reverse-engineering of integrated circuits (ICs) by malicious third-party …