Advances in logic locking: Past, present, and prospects

HM Kamali, KZ Azar, F Farahmandi… - Cryptology ePrint …, 2022 - eprint.iacr.org
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …

Defense-in-depth: A recipe for logic locking to prevail

MT Rahman, MS Rahman, H Wang, S Tajik, W Khalil… - Integration, 2020 - Elsevier
Logic locking/obfuscation has emerged as an auspicious solution for protecting the
semiconductor intellectual property (IP) from the untrusted entities in the design and …

Anti-SAT: Mitigating SAT attack on logic locking

Y **e, A Srivastava - … on Computer-Aided Design of Integrated …, 2018 - ieeexplore.ieee.org
Logic locking is a technique that is proposed to protect outsourced IC designs from piracy
and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality …

SMT attack: Next generation attack on obfuscated circuits with capabilities and performance beyond the SAT attacks

KZ Azar, HM Kamali, H Homayoun… - IACR Transactions on …, 2019 - tches.iacr.org
In this paper, we introduce the Satisfiability Modulo Theory (SMT) attack on obfuscated
circuits. The proposed attack is the superset of Satisfiability (SAT) attack, with many …

CycSAT: SAT-based attack on cyclic logic encryptions

H Zhou, R Jiang, S Kong - 2017 IEEE/ACM International …, 2017 - ieeexplore.ieee.org
Cyclic logic encryption is a newly proposed circuit obfuscation technique in hardware
security. It was claimed to be SAT-unresolvable because feedback cycles were intentionally …

Provably secure camouflaging strategy for IC protection

M Li, K Shamsi, T Meade, Z Zhao, B Yu… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
The advancing of reverse engineering techniques has complicated the efforts in intellectual
property protection. Proactive methods have been developed recently, among which layout …

Keynote: A disquisition on logic locking

A Chakraborty, NG Jayasankaran, Y Liu… - … on Computer-Aided …, 2019 - ieeexplore.ieee.org
The fabless business model has given rise to many security threats, including piracy of
intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and …

Thwarting all logic locking attacks: Dishonest oracle with truly random logic locking

N Limaye, E Kalligeros, N Karousos… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
While logic locking is a promising defense to protect hardware designs, many attacks have
been shown to undermine its security by retrieving the secret key. All the powerful attacks …

InterLock: An intercorrelated logic and routing locking

HM Kamali, KZ Azar, H Homayoun… - Proceedings of the 39th …, 2020 - dl.acm.org
In this paper, we propose a canonical prune-and-SAT (CP&SAT) attack for breaking state-of-
the-art routing-based obfuscation techniques. In the CP&SAT attack, we first encode the key …

IP protection and supply chain security through logic obfuscation: A systematic overview

K Shamsi, M Li, K Plaks, S Fazzari, DZ Pan… - ACM Transactions on …, 2019 - dl.acm.org
The globalization of the semiconductor supply chain introduces ever-increasing security and
privacy risks. Two major concerns are IP theft through reverse engineering and malicious …