Logic locking for IP security: a comprehensive analysis on challenges, techniques, and trends

J Gandhi, D Shekhawat, M Santosh, JG Pandey - Computers & Security, 2023 - Elsevier
A substantial part of the Integrated Circuit (IC) supply chain that involves semiconductor
fabrication, packaging, and testing has shifted globally to minimize IC costs and satisfy …

An overview of FPGA-inspired obfuscation techniques

ZU Abideen, S Gokulanathan, M J. Aljafar… - ACM Computing …, 2024 - dl.acm.org
Building and maintaining a silicon foundry is a costly endeavor that requires substantial
financial investment. From this scenario, the semiconductor business has largely shifted to a …

Advancing trustworthiness in system-in-package: A novel root-of-trust hardware security module for heterogeneous integration

MSUI Sami, T Zhang, AM Shuvo, MSU Haque… - IEEE …, 2024 - ieeexplore.ieee.org
The semiconductor industry has adopted heterogeneous integration (HI), incorporating
modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to …

Hardware security exploiting post-CMOS devices: Fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap

A Japa, MK Majumder, SK Sahoo… - IEEE Circuits and …, 2021 - ieeexplore.ieee.org
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing
hardware-oriented security and trust. However, implementing hardware security primitives …

[HTML][HTML] Simple integrated circuit reverse-engineering with deep learning: A proof of concept for automating die-polygon-capturing

Q van der Linden, E Vanmassenhove… - Expert Systems with …, 2025 - Elsevier
The purpose of this research is to demonstrate the feasibility of automating 'die-polygon-
capturing', an economical yet still labor-intensive technique for circuit extraction during the …

ALICE: An automatic design flow for eFPGA redaction

CM Tomajoli, L Collini, J Bhandari, AKT Moosa… - Proceedings of the 59th …, 2022 - dl.acm.org
Fabricating an integrated circuit is becoming unaffordable for many semiconductor design
houses. Outsourcing the fabrication to a third-party foundry requires methods to protect the …

Hardware trojan insertion in finalized layouts: From methodology to a silicon demonstration

TD Perez, S Pagliarini - … Aided Design of Integrated Circuits and …, 2022 - ieeexplore.ieee.org
Owning a high-end semiconductor foundry is a luxury very few companies can afford. Thus,
fabless design companies outsource integrated circuit fabrication to third parties. Within …

A Zero Trust-based framework employed by Blockchain Technology and Ring Oscillator Physical Unclonable Functions for security of Field Programmable Gate Array …

A Kulkarni, NA Hazari, M Niamat - IEEE Access, 2024 - ieeexplore.ieee.org
The field programmable gate array (FPGA) supply chain is vulnerable to security issues from
untrusted participants involved, resulting in the significant research being conducted in this …

Side-channel trojan insertion-a practical foundry-side attack via ECO

T Perez, M Imran, P Vaz… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Design companies often outsource their integrated circuit (IC) fabrication to third parties
where ICs are susceptible to malicious acts such as the insertion of a side-channel …

Digital-to-analog hardware Trojan attacks

M Elshamy, G Di Natale, A Sayed… - … on Circuits and …, 2021 - ieeexplore.ieee.org
We propose a Hardware Trojan (HT) attack for analog circuits with its key characteristic
being that it cannot be prevented or detected in the analog domain. The HT attack works in …