Lut-lock: A novel lut-based logic obfuscation for fpga-bitstream and asic-hardware protection

HM Kamali, KZ Azar, K Gaj… - 2018 IEEE Computer …, 2018‏ - ieeexplore.ieee.org
In this work, we propose LUT-Lock, a novel Look-Up-Table-based netlist obfuscation
algorithm, for protecting the intellectual property that is mapped to an FPGA bitstream or an …

Role of FPGA in internet of things applications

M Elnawawy, A Farhan, A Al Nabulsi… - 2019 IEEE …, 2019‏ - ieeexplore.ieee.org
This paper discusses the role of Field Programmable Gate Array (FPGA) in Internet of Things
(IoT) applications. Benefits of FPGAs over ASICs and microcontrollers are emphasized to …

Hardware obfuscation and logic locking: A tutorial introduction

T Hoque, RS Chakraborty, S Bhunia - IEEE Design & Test, 2020‏ - ieeexplore.ieee.org
If you are designing or integrating hardware IP blocks into your designs, and you are using
common global supply chains, then reading this overview article on how to protect your IP …

Heterogeneous integration supply chain integrity through blockchain and CHSM

PE Calzada, MSUI Sami, KZ Azar, F Rahman… - ACM Transactions on …, 2023‏ - dl.acm.org
Over the past few decades, electronics have become commonplace in government,
commercial, and social domains. These devices have developed rapidly, as seen in the …

FPGA bitstream security: a day in the life

A Duncan, F Rahman, A Lukefahr… - … test conference (ITC …, 2019‏ - ieeexplore.ieee.org
Security concerns for field-programmable gate array (FPGA) applications and hardware are
evolving as FPGA designs grow in complexity, involve sophisticated intellectual properties …

Trustore: Side-channel resistant storage for sgx using intel hybrid cpu-fpga

H Oh, A Ahmad, S Park, B Lee, Y Paek - Proceedings of the 2020 ACM …, 2020‏ - dl.acm.org
Intel SGX is a security solution promising strong and practical security guarantees for trusted
computing. However, recent reports demonstrated that such security guarantees of SGX are …

Recycled FPGA detection using exhaustive LUT path delay characterization and voltage scaling

MM Alam, M Tehranipoor… - IEEE Transactions on Very …, 2019‏ - ieeexplore.ieee.org
Field-programmable gate arrays (FPGAs) have been extensively used because of their
lower nonrecurring engineering and design costs, instant availability and reduced visibility …

A framework for automated exploration of trojan attack space in FPGA netlists

J Cruz, C Posada, NVR Masna… - IEEE Transactions …, 2023‏ - ieeexplore.ieee.org
Field Programmable Gate Arrays (FPGAs) provide a flexible compute platform for quick
prototy** or hardware acceleration in diverse application domains. However, similar to the …

Turning the table: Using bitstream reverse engineering to detect FPGA trojans

W Danesh, J Banago, M Rahman - Journal of Hardware and Systems …, 2021‏ - Springer
According to recent reports and surveys over the last 2 years, field-programmable gate
arrays (FPGAs) have increasingly become the prime targets for carrying out extremely …

FPGA Bitstream Modification: Attacks and Countermeasures

M Moraitis - IEEE Access, 2023‏ - ieeexplore.ieee.org
Advances in Field-Programmable Gate Array (FPGA) technology in recent years have
resulted in an expansion of its usage in a very wide spectrum of applications. Apart from …