IP protection and supply chain security through logic obfuscation: A systematic overview
The globalization of the semiconductor supply chain introduces ever-increasing security and
privacy risks. Two major concerns are IP theft through reverse engineering and malicious …
privacy risks. Two major concerns are IP theft through reverse engineering and malicious …
Defense-in-depth: A recipe for logic locking to prevail
Logic locking/obfuscation has emerged as an auspicious solution for protecting the
semiconductor intellectual property (IP) from the untrusted entities in the design and …
semiconductor intellectual property (IP) from the untrusted entities in the design and …
The unpatchable silicon: a full break of the bitstream encryption of xilinx 7-series {FPGAs}
The security of FPGAs is a crucial topic, as any vulnerability within the hardware can have
severe consequences, if they are used in a secure design. Since FPGA designs are …
severe consequences, if they are used in a secure design. Since FPGA designs are …
The key is left under the mat: On the inappropriate security assumption of logic locking schemes
Logic locking has been proposed as an obfuscation technique to protect outsourced IC
designs from IP piracy by untrusted entities in the design and fabrication process. In this …
designs from IP piracy by untrusted entities in the design and fabrication process. In this …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
Trust in FPGA-accelerated cloud computing
F Turan, I Verbauwhede - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Platforms combining Central Processing Systems (CPUs) with Field Programmable Gate
Arrays (FPGAs) have become popular, as they promise high performance with energy …
Arrays (FPGAs) have become popular, as they promise high performance with energy …
Real-world snapshots vs. theory: Questioning the t-probing security model
Due to its sound theoretical basis and practical efficiency, masking has become the most
prominent countermeasure to protect cryptographic implementations against physical side …
prominent countermeasure to protect cryptographic implementations against physical side …
iPROBE: internal shielding approach for protecting against front-side and back-side probing attacks
Focused ion beam (FIB) has emerged as one of the most prevalent integrated circuit (IC)
editing techniques in the past decade, greatly assisting post-silicon debugging and failure …
editing techniques in the past decade, greatly assisting post-silicon debugging and failure …
Automatic Extraction of Secrets from the Transistor Jungle using {Laser-Assisted}{Side-Channel} Attacks
The security of modern electronic devices relies on secret keys stored on secure hardware
modules as the root-of-trust (RoT). Extracting those keys would break the security of the …
modules as the root-of-trust (RoT). Extracting those keys would break the security of the …
Whispering devices: A survey on how side-channels lead to compromised information
While operating, information processing devices or communication systems may emit
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …