Fun-SAT: Functional corruptibility-guided SAT-based attack on sequential logic encryption

Y Hu, Y Zhang, K Yang, D Chen… - … Security and Trust …, 2021 - ieeexplore.ieee.org
The SAT attack has shown to be efficient against most combinational logic encryption
methods. It can be extended to attack sequential logic encryption techniques by leveraging …

On the security of sequential logic locking against oracle-guided attacks

Y Hu, Y Zhang, K Yang, D Chen… - … on Computer-Aided …, 2023 - ieeexplore.ieee.org
The Boolean satisfiability (SAT) attack is an oracle-guided attack that can break most
combinational logic locking schemes by efficiently pruning out all the wrong keys from the …

DECOR: Enhancing Logic Locking Against Machine Learning-Based Attacks

Y Hu, K Yang, SD Chowdhury… - 2024 25th International …, 2024 - ieeexplore.ieee.org
Logic locking (LL) has gained attention as a promising intellectual property protection
measure for integrated circuits. However, recent attacks, facilitated by machine learning …

SANSCrypt: Sporadic-authentication-based sequential logic encryption

Y Hu, K Yang, S Nazarian, P Nuzzo - VLSI-SoC: Design Trends: 28th IFIP …, 2021 - Springer
Sequential logic encryption is a countermeasure against reverse engineering of sequential
circuits based on modifying the original finite state machine of the circuit such that the circuit …

LOTUS: A Scalable Framework to Lock Multi-Module Designs With One-Time Key and Self-Destructive Approaches

M Hashemi, S Mohammadi… - IEEE Embedded Systems …, 2024 - ieeexplore.ieee.org
The involvement of external parties in integrated circuits (IC) supply chain has raised
security issues such as cloning, overproduction, and unauthorized integration/activation …

A Structural and SAT Analysis of SANSCrypt

J Geist, S Zhang, Y Jin, T Meade - 2022 Asian Hardware …, 2022 - ieeexplore.ieee.org
As IP theft remains an important problem, and attacks against logic locking mechanisms are
becoming more sophisticated, the complexity of proposed encryption schemes are also …

New Perspectives on Sequential Reverse Engineering and Obfuscation

MF Brunner - 2024 - mediatum.ub.tum.de
This thesis contributes to protecting the chips' intellectual property by taking a novel
perspective on sequential reverse engineering and obfuscation. It derives a novel …

Graph Machine Learning for Hardware Security and Security of Graph Machine Learning: Attacks and Defenses

SD Chowdhury - 2024 - search.proquest.com
The burgeoning costs of integrated circuit (IC) fabrication have led to widespread
globalization of the IC supply chain, exposing IC designs to hardware security threats like …

Measuring Security Metrics of Locked Circuits with Test

D Duvalsaint - 2022 - search.proquest.com
The development of integrated circuits (ICs) at smaller technology nodes has led to an
increase in fabrication costs. Consequently, many companies are outsourcing their …

Security-Driven Design of Logic Locking Schemes: Metrics, Attacks, and Defenses

Y Hu - 2022 - search.proquest.com
Logic locking has gained significant attention, over the past decade, as a promising solution
to prevent the reverse-engineering of integrated circuits (ICs) by malicious third-party …