Defense-in-depth: A recipe for logic locking to prevail

MT Rahman, MS Rahman, H Wang, S Tajik, W Khalil… - Integration, 2020 - Elsevier
Logic locking/obfuscation has emerged as an auspicious solution for protecting the
semiconductor intellectual property (IP) from the untrusted entities in the design and …

Challenging the security of logic locking schemes in the era of deep learning: A neuroevolutionary approach

D Sisejkovic, F Merchant, LM Reimann… - ACM Journal on …, 2021 - dl.acm.org
Logic locking is a prominent technique to protect the integrity of hardware designs
throughout the integrated circuit design and fabrication flow. However, in recent years, the …

On the difficulty of FSM-based hardware obfuscation

M Fyrbiak, S Wallat, J Déchelotte, N Albartus… - IACR Transactions on …, 2018 - tches.iacr.org
In today's Integrated Circuit (IC) production chains, a designer's valuable Intellectual
Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy. To …

Development and evaluation of hardware obfuscation benchmarks

S Amir, B Shakya, X Xu, Y **, S Bhunia… - Journal of Hardware and …, 2018 - Springer
Obfuscation is a promising solution for securing hardware intellectual property (IP) against
various attacks, such as reverse engineering, piracy, and tampering. Due to the lack of …

A secure hardware-software solution based on RISC-V, logic locking and microkernel

D Šišejković, F Merchant, LM Reimann… - Proceedings of the 23th …, 2020 - dl.acm.org
In this paper we present the first generation of a secure platform developed by following a
security-by-design approach. The security of the platform is built on top of two pillars: a …

Control-lock: Securing processor cores against software-controlled hardware trojans

D Šišejković, F Merchant, R Leupers… - Proceedings of the …, 2019 - dl.acm.org
Malicious circuit modifications known as hardware Trojans represent a rising threat to the
integrated circuit supply chain. As many Trojans are activated based on a specific sequence …

An on-chip dynamically obfuscated wrapper for protecting supply chain against IP and IC piracies

D Zhang, X Wang, MT Rahman… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the modern semiconductor supply chain, the ownership of both intellectual property (IP)
and integrated circuit (IC) cannot be guaranteed. The IP piracy may take place at the …

Hybrid Protection of Digital FIR Filters

L Aksoy, QL Nguyen, F Almeida, J Raik… - … Transactions on Very …, 2023 - ieeexplore.ieee.org
A digital finite impulse response (FIR) filter is a ubiquitous block in digital signal processing
applications and its behavior is determined by its coefficients. To protect filter coefficients …

Vertical IP protection of the next-generation devices: Quo vadis?

S Rai, S Garg, C Pilato, V Herdt… - … , Automation & Test …, 2021 - ieeexplore.ieee.org
With the advent of 5G and IoT applications, there is a greater thrust in terms of hardware
security due to imminent risks caused by high amount of intercommunication between …

Counterfeit detection and avoidance with physical inspection

N Asadizanjani, MT Rahman, M Tehranipoor… - Physical Assurance: For …, 2021 - Springer
Counterfeit integrated circuits (IC) are illegitimate parts that can cause financial loss and
early systems failure. In safety-critical systems, early failure may have life-threatening …