Advances in logic locking: Past, present, and prospects

HM Kamali, KZ Azar, F Farahmandi… - Cryptology ePrint …, 2022‏ - eprint.iacr.org
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …

Logic locking for IP security: a comprehensive analysis on challenges, techniques, and trends

J Gandhi, D Shekhawat, M Santosh, JG Pandey - Computers & Security, 2023‏ - Elsevier
A substantial part of the Integrated Circuit (IC) supply chain that involves semiconductor
fabrication, packaging, and testing has shifted globally to minimize IC costs and satisfy …

Advancing trustworthiness in system-in-package: A novel root-of-trust hardware security module for heterogeneous integration

MSUI Sami, T Zhang, AM Shuvo, MSU Haque… - IEEE …, 2024‏ - ieeexplore.ieee.org
The semiconductor industry has adopted heterogeneous integration (HI), incorporating
modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to …

Deceptive logic locking for hardware integrity protection against machine learning attacks

D Sisejkovic, F Merchant, LM Reimann… - IEEE Transactions on …, 2021‏ - ieeexplore.ieee.org
Logic locking has emerged as a prominent key-driven technique to protect the integrity of
integrated circuits. However, novel machine-learning-based attacks have recently been …

NNgSAT: Neural network guided SAT attack on logic locked complex structures

KZ Azar, HM Kamali, H Homayoun… - Proceedings of the 39th …, 2020‏ - dl.acm.org
The globalization of the IC supply chain has raised many security threats, especially when
untrusted parties are involved. This has created a demand for a dependable logic …

Exploring eFPGA-based redaction for IP protection

J Bhandari, AKT Moosa, B Tan, C Pilato… - 2021 IEEE/ACM …, 2021‏ - ieeexplore.ieee.org
Recently, eFPGA-based redaction has been proposed as a promising solution for hiding
parts of a digital design from untrusted entities, where legitimate end-users can restore …

From cryptography to logic locking: A survey on the architecture evolution of secure scan chains

KZ Azar, HM Kamali, H Homayoun, A Sasan - IEEE Access, 2021‏ - ieeexplore.ieee.org
The availability of access to Integrated Circuits' scan chain is an inevitable requirement of
modern ICs for testability/debugging purposes. However, leaving access to the scan chain …

RANE: An open-source formal de-obfuscation attack for reverse engineering of logic encrypted circuits

S Roshanisefat, H Mardani Kamali… - Proceedings of the …, 2021‏ - dl.acm.org
To enable trust in the IC supply chain, logic locking as an IP protection technique received
significant attention in recent years. Over the years, by utilizing Boolean satisfiability (SAT) …

ReTrustFSM: toward RTL hardware obfuscation-a hybrid FSM approach

MS Rahman, R Guo, HM Kamali, F Rahman… - IEEE …, 2023‏ - ieeexplore.ieee.org
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain
threats, ie, IP piracy and overproduction. Many studies have evaluated numerous …

Graph neural networks: A powerful and versatile tool for advancing design, reliability, and security of ICs

L Alrahis, J Knechtel, O Sinanoglu - Proceedings of the 28th Asia and …, 2023‏ - dl.acm.org
Graph neural networks (GNNs) have pushed the state-of-the-art (SOTA) for performance in
learning and predicting on large-scale data present in social networks, biology, etc. Since …