Encrypt flip-flop: A novel logic encryption technique for sequential circuits

R Karmakar, S Chatopadhyay, R Kapur - arXiv preprint arXiv:1801.04961, 2018 - arxiv.org
Logic Encryption is one of the most popular hardware security techniques which can prevent
IP piracy and illegal IC overproduction. It introduces obfuscation by inserting some extra …

Survey on recent counterfeit IC detection techniques and future research directions

E Oriero, SR Hasan - Integration, 2019 - Elsevier
In recent years, globalization of the semiconductor supply chain has led to a more complex
production cycle with parts coming from various producers in diverse locations. Outsourcing …

Exploiting hardware obfuscation methods to prevent and detect hardware trojans

Q Yu, J Dofe, Z Zhang - 2017 IEEE 60th International Midwest …, 2017 - ieeexplore.ieee.org
Due to the globalized semiconductor supply chain, integrated circuits suffer from hardware
security attacks. Among various attacks, hardware Trojan insertions have emerged as a …

A blockchain-based traceable IP copyright protection algorithm

L Xiao, W Huang, Y Xie, W Xiao, KC Li - IEEE Access, 2020 - ieeexplore.ieee.org
Current Intellectual Property (IP) copyright protection technologies have low efficiency of
authority management, traceability, and scalability. In this work, a blockchain-based IP …

Protecting analog circuits with parameter biasing obfuscation

VV Rao, I Savidis - 2017 18th IEEE Latin American Test …, 2017 - ieeexplore.ieee.org
A methodology to secure analog intellectual property (IP) by obfuscating biasing conditions
is presented in this paper. Previous research methodologies have focused on protecting …

Rescuing logic encryption in post-SAT era by locking & obfuscation

A Rezaei, Y Shen, H Zhou - 2020 Design, Automation & Test in …, 2020 - ieeexplore.ieee.org
The active participation of external entities in the manufacturing flow has produced
numerous hardware security issues in which piracy and overproduction are likely to be the …

Global attack and remedy on IC-specific logic encryption

A Rezaei, A Hedayatipour, H Sayadi… - … Security and Trust …, 2022 - ieeexplore.ieee.org
In recent years, semiconductor industry has out-sourced the manufacturing to low-cost but
not necessarily trusted foundries. This fabless business model encounters new security …

Anti-piracy design of RF transceivers

AR Díaz-Rizo, H Aboushady… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We present a locking-based design-for-security methodology to prevent piracy of RF
transceiver integrated circuits. The solution is called SyncLock as it locks the …

GateLock: Input-Dependent Key-based locked Gates for SAT resistant logic locking

VS Rathor, M Singh, KS Sahoo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Logic locking has become a robust method for reducing the risk of intellectual property (IP)
piracy, overbuilding, and hardware Trojan threats throughout the lifespan of integrated …

Efficient design and analysis of secure CMOS logic through logic encryption

SS Chandra, RJ Kannan, BS Balaji… - Scientific Reports, 2023 - nature.com
Untrusted third parties and untrustworthy foundries highlighted the significance of hardware
security in the present-day world. Because of the globalization of integrated circuit (IC) …