Encrypt flip-flop: A novel logic encryption technique for sequential circuits
R Karmakar, S Chatopadhyay, R Kapur - arXiv preprint arXiv:1801.04961, 2018 - arxiv.org
Logic Encryption is one of the most popular hardware security techniques which can prevent
IP piracy and illegal IC overproduction. It introduces obfuscation by inserting some extra …
IP piracy and illegal IC overproduction. It introduces obfuscation by inserting some extra …
Survey on recent counterfeit IC detection techniques and future research directions
In recent years, globalization of the semiconductor supply chain has led to a more complex
production cycle with parts coming from various producers in diverse locations. Outsourcing …
production cycle with parts coming from various producers in diverse locations. Outsourcing …
Exploiting hardware obfuscation methods to prevent and detect hardware trojans
Due to the globalized semiconductor supply chain, integrated circuits suffer from hardware
security attacks. Among various attacks, hardware Trojan insertions have emerged as a …
security attacks. Among various attacks, hardware Trojan insertions have emerged as a …
A blockchain-based traceable IP copyright protection algorithm
L Xiao, W Huang, Y Xie, W Xiao, KC Li - IEEE Access, 2020 - ieeexplore.ieee.org
Current Intellectual Property (IP) copyright protection technologies have low efficiency of
authority management, traceability, and scalability. In this work, a blockchain-based IP …
authority management, traceability, and scalability. In this work, a blockchain-based IP …
Protecting analog circuits with parameter biasing obfuscation
A methodology to secure analog intellectual property (IP) by obfuscating biasing conditions
is presented in this paper. Previous research methodologies have focused on protecting …
is presented in this paper. Previous research methodologies have focused on protecting …
Rescuing logic encryption in post-SAT era by locking & obfuscation
The active participation of external entities in the manufacturing flow has produced
numerous hardware security issues in which piracy and overproduction are likely to be the …
numerous hardware security issues in which piracy and overproduction are likely to be the …
Global attack and remedy on IC-specific logic encryption
In recent years, semiconductor industry has out-sourced the manufacturing to low-cost but
not necessarily trusted foundries. This fabless business model encounters new security …
not necessarily trusted foundries. This fabless business model encounters new security …
Anti-piracy design of RF transceivers
AR Díaz-Rizo, H Aboushady… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We present a locking-based design-for-security methodology to prevent piracy of RF
transceiver integrated circuits. The solution is called SyncLock as it locks the …
transceiver integrated circuits. The solution is called SyncLock as it locks the …
GateLock: Input-Dependent Key-based locked Gates for SAT resistant logic locking
Logic locking has become a robust method for reducing the risk of intellectual property (IP)
piracy, overbuilding, and hardware Trojan threats throughout the lifespan of integrated …
piracy, overbuilding, and hardware Trojan threats throughout the lifespan of integrated …
Efficient design and analysis of secure CMOS logic through logic encryption
Untrusted third parties and untrustworthy foundries highlighted the significance of hardware
security in the present-day world. Because of the globalization of integrated circuit (IC) …
security in the present-day world. Because of the globalization of integrated circuit (IC) …