Advances in logic locking: Past, present, and prospects

HM Kamali, KZ Azar, F Farahmandi… - Cryptology ePrint …, 2022‏ - eprint.iacr.org
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …

Defense-in-depth: A recipe for logic locking to prevail

MT Rahman, MS Rahman, H Wang, S Tajik, W Khalil… - Integration, 2020‏ - Elsevier
Logic locking/obfuscation has emerged as an auspicious solution for protecting the
semiconductor intellectual property (IP) from the untrusted entities in the design and …

The key is left under the mat: On the inappropriate security assumption of logic locking schemes

MT Rahman, S Tajik, MS Rahman… - … Security and Trust …, 2020‏ - ieeexplore.ieee.org
Logic locking has been proposed as an obfuscation technique to protect outsourced IC
designs from IP piracy by untrusted entities in the design and fabrication process. In this …

Advancing trustworthiness in system-in-package: A novel root-of-trust hardware security module for heterogeneous integration

MSUI Sami, T Zhang, AM Shuvo, MSU Haque… - IEEE …, 2024‏ - ieeexplore.ieee.org
The semiconductor industry has adopted heterogeneous integration (HI), incorporating
modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to …

Sofi: Security property-driven vulnerability assessments of ics against fault-injection attacks

H Wang, H Li, F Rahman… - … on Computer-Aided …, 2021‏ - ieeexplore.ieee.org
Fault-injection attacks have become a major concern for hardware designs, primarily due to
their powerful capability in tampering with critical locations in a device to cause violation of …

A survey on risc-v security: Hardware and architecture

T Lu - arxiv preprint arxiv:2107.04175, 2021‏ - arxiv.org
The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors
are the processing engines of smart IoT devices. For decades, these processors were …

Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives

UJ Botero, R Wilson, H Lu, MT Rahman… - ACM Journal on …, 2021‏ - dl.acm.org
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …

Physical inspection & attacks: New frontier in hardware security

MT Rahman, Q Shi, S Tajik, H Shen… - 2018 IEEE 3rd …, 2018‏ - ieeexplore.ieee.org
Due to globalization, the semiconductor industry is becoming more susceptible to trust and
security issues. Hardware Trojans, ie, malicious modification to integrated circuits (ICs), can …

A novel FPGA implementation of the NAND-PUF with minimal resource usage and high reliability

R Della Sala, G Scotti - Cryptography, 2023‏ - mdpi.com
In this work we propose a novel implementation on recent **linx FPGA platforms of a PUF
architecture based on the NAND SR-latch (referred to as NAND-PUF in the following) which …

A survey and comparative analysis of security properties of can authentication protocols

A Lotto, F Marchiori, A Brighente… - … Surveys & Tutorials, 2024‏ - ieeexplore.ieee.org
Modern cars' complexity and increased reliance on electronic components have made them
a prime target for attackers. In particular, the in-vehicle communication system is one of the …