KC2: Key-condition crunching for fast sequential circuit deobfuscation
Logic locking and IC camouflaging are two promising techniques for thwarting an array of
supply chain threats. Logic locking can hide the design from the foundry as well as end …
supply chain threats. Logic locking can hide the design from the foundry as well as end …
SAT-swee** enhanced for logic synthesis
SAT-swee** is a powerful method for simplifying logic networks. It consists of merging
gates that are proven equivalent (up to complementation) by running simulation and SAT …
gates that are proven equivalent (up to complementation) by running simulation and SAT …
Vulnerability Assessment of Logic Locking Techniques: Towards Next Generation Attacks on Logic Locking
KZ Azar - 2021 - search.proquest.com
To save the ever-increasing costs of maintaining an integrated circuit (IC) supply chain
facility, take advantage of cutting-edge technology nodes, and meet the market demand, the …
facility, take advantage of cutting-edge technology nodes, and meet the market demand, the …
Circuit (De) Obfuscation: Novel Algorithms, and Formal Methods
K Shamsi - 2020 - search.proquest.com
In today's globalized semiconductor supply chain, a consolidation of fabrication services and
their separation from design houses has been taking place. This separation has raised …
their separation from design houses has been taking place. This separation has raised …
Satisfiability swee** for synthesis
A system and method for SAT-swee** is disclosed. According to one embodiment, a
method includes determining gate classes by inputting simulation patterns to gates in an …
method includes determining gate classes by inputting simulation patterns to gates in an …
Efficient Representation of Program States
P Jančík - 2017 - dspace.cuni.cz
The goal of automated software verification is either to prove the safety or to find erroneous
behavior. To achieve this, verification techniques need to efficiently represent program …
behavior. To achieve this, verification techniques need to efficiently represent program …
Practical CNF Interpolants Via BDDs
ALNNL Ryzhyk12 - Citeseer
Craig interpolation has been recently shown to be useful in a wide variety of problem
domains. One use is in strategy extraction for two player games, as described in our …
domains. One use is in strategy extraction for two player games, as described in our …