Advances in logic locking: Past, present, and prospects

HM Kamali, KZ Azar, F Farahmandi… - Cryptology ePrint …, 2022‏ - eprint.iacr.org
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …

Review of cybersecurity assessment methods: Applicability perspective

R Leszczyna - Computers & Security, 2021‏ - Elsevier
Cybersecurity assessments are crucial in building the assurance that vital cyberassets are
effectively protected from threats. Multiple assessment methods have been proposed during …

ReTrustFSM: toward RTL hardware obfuscation-a hybrid FSM approach

MS Rahman, R Guo, HM Kamali, F Rahman… - IEEE …, 2023‏ - ieeexplore.ieee.org
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain
threats, ie, IP piracy and overproduction. Many studies have evaluated numerous …

Logic locking for IP security: a comprehensive analysis on challenges, techniques, and trends

J Gandhi, D Shekhawat, M Santosh, JG Pandey - Computers & Security, 2023‏ - Elsevier
A substantial part of the Integrated Circuit (IC) supply chain that involves semiconductor
fabrication, packaging, and testing has shifted globally to minimize IC costs and satisfy …

O'clock: lock the clock via clock-gating for soc ip protection

MS Rahman, R Guo, HM Kamali, F Rahman… - Proceedings of the 59th …, 2022‏ - dl.acm.org
Existing logic locking techniques can prevent IP piracy or tampering. However, they often
come at the expense of high overhead and are gradually becoming vulnerable to emerging …

Complexity analysis of the SAT attack on logic locking

Y Zhong, U Guin - … Transactions on Computer-Aided Design of …, 2023‏ - ieeexplore.ieee.org
Due to the adoption of horizontal business models following the globalization of
semiconductor manufacturing, the overproduction of integrated circuits (ICs) and the piracy …

Quantifiable assurance: From ips to platforms

B Ahmed, MK Bepary, N Pundir, M Borza… - arxiv preprint arxiv …, 2022‏ - arxiv.org
Hardware vulnerabilities are generally considered more difficult to fix than software ones
because they are persistent after fabrication. Thus, it is crucial to assess the security and fix …

Hlock+: A robust and low-overhead logic locking at the high-level language

MR Muttaki, R Mohammadivojdan… - … on Computer-Aided …, 2022‏ - ieeexplore.ieee.org
With the emergence of the horizontal business model in the semiconductor industry,
numerous hardware security concerns have been emerged, including intellectual property …

Security analysis of scan obfuscation techniques

Y Sao, SS Ali - IEEE Transactions on Information Forensics …, 2023‏ - ieeexplore.ieee.org
Scan is the de-facto standard for testing, which provides high observability and test
coverage by enabling direct access to chip memory elements. The scan-based Design-for …

On the security of sequential logic locking against oracle-guided attacks

Y Hu, Y Zhang, K Yang, D Chen… - … on Computer-Aided …, 2023‏ - ieeexplore.ieee.org
The Boolean satisfiability (SAT) attack is an oracle-guided attack that can break most
combinational logic locking schemes by efficiently pruning out all the wrong keys from the …