Advances in logic locking: Past, present, and prospects

HM Kamali, KZ Azar, F Farahmandi… - Cryptology ePrint …, 2022 - eprint.iacr.org
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …

Evolution of attacks, threat models, and solutions for virtualized systems

D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …

A survey on chip to system reverse engineering

SE Quadir, J Chen, D Forte, N Asadizanjani… - ACM journal on …, 2016 - dl.acm.org
The reverse engineering (RE) of electronic chips and systems can be used with honest and
dishonest intentions. To inhibit RE for those with dishonest intentions (eg, piracy and …

Keynote: A disquisition on logic locking

A Chakraborty, NG Jayasankaran, Y Liu… - … on Computer-Aided …, 2019 - ieeexplore.ieee.org
The fabless business model has given rise to many security threats, including piracy of
intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and …

ReTrustFSM: toward RTL hardware obfuscation-a hybrid FSM approach

MS Rahman, R Guo, HM Kamali, F Rahman… - IEEE …, 2023 - ieeexplore.ieee.org
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain
threats, ie, IP piracy and overproduction. Many studies have evaluated numerous …

RANE: An open-source formal de-obfuscation attack for reverse engineering of logic encrypted circuits

S Roshanisefat, H Mardani Kamali… - Proceedings of the …, 2021 - dl.acm.org
To enable trust in the IC supply chain, logic locking as an IP protection technique received
significant attention in recent years. Over the years, by utilizing Boolean satisfiability (SAT) …

Revisit sequential logic obfuscation: Attacks and defenses

T Meade, Z Zhao, S Zhang, D Pan… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
The urgent requests to protection integrated circuits (IC) and hardware intellectual properties
(IP) have led to the development of various logic obfuscation methods. While most existing …

On the difficulty of FSM-based hardware obfuscation

M Fyrbiak, S Wallat, J Déchelotte, N Albartus… - IACR Transactions on …, 2018 - tches.iacr.org
Abstract In today's Integrated Circuit (IC) production chains, a designer's valuable
Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to …

Novel dynamic state-deflection method for gate-level design obfuscation

J Dofe, Q Yu - IEEE Transactions on Computer-Aided Design of …, 2017 - ieeexplore.ieee.org
The emerging security threats in the integrated circuit supply chain do not only challenge the
chip integrity, but also raise serious concerns on hardware intellectual property (IP) piracy …

Develo** a highly responsive miniaturized security device based on a printed copper ammine energetic composite

F Sevely, T Wu, FSF de Sousa, L Séguier… - Sensors and Actuators A …, 2022 - Elsevier
This work presents a triggerable ultimate security device (USD) capable of physically
destroying a memory chip that contains classified data within a few milliseconds upon the …