Quantifiable assurance: From ips to platforms

B Ahmed, MK Bepary, N Pundir, M Borza… - arxiv preprint arxiv …, 2022‏ - arxiv.org
Hardware vulnerabilities are generally considered more difficult to fix than software ones
because they are persistent after fabrication. Thus, it is crucial to assess the security and fix …

Robust and attack resilient logic locking with a high application-level impact

Y Liu, M Zuzak, Y **e, A Chakraborty… - ACM Journal on …, 2021‏ - dl.acm.org
Logic locking is a hardware security technique aimed at protecting intellectual property
against security threats in the IC supply chain, especially those posed by untrusted …

Special session: Novel attacks on logic-locking

A Jain, U Guin, MT Rahman… - 2020 IEEE 38th VLSI …, 2020‏ - ieeexplore.ieee.org
The outsourcing of the design and manufacturing of integrated circuits (IC) involves various
untrusted entities, which can pose many security threats such as overproduction of ICs, sale …

SANSCrypt: A sporadic-authentication-based sequential logic encryption scheme

Y Hu, K Yang, S Nazarian… - 2020 IFIP/IEEE 28th …, 2020‏ - ieeexplore.ieee.org
We propose SANSCrypt, a novel sequential logic encryption scheme to protect integrated
circuits against reverse engineering. Previous sequential encryption methods focus on …

[HTML][HTML] Protecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo-Random Number Generation

J Wu, O Dizon-Paradis, S Rahman, DL Woodard… - Cryptography, 2025‏ - mdpi.com
Design-for-test/debug (DfT/D) introduces scan chain testing to increase testability and fault
coverage by inserting scan flip-flops. However, these scan chains are also known to be a …

Obfusgem: Enhancing processor design obfuscation through security-aware on-chip memory and data path design

M Zuzak, A Srivastava - Proceedings of the International Symposium on …, 2020‏ - dl.acm.org
A sizable body of work has identified the importance of architecture and application level
security when using logic locking, a family of module level supply chain security techniques …

Counterfeit and recycled ic detection

M Tehranipoor, N Pundir, N Vashistha… - Hardware Security …, 2022‏ - Springer
Security has grown increasingly crucial in recent years in many parts of computing. It is
especially true regarding hardware, which is usually referred to as the “root of trust” for a …

[PDF][PDF] DOSCrack: Deobfuscation Using Oracle-Guided Symbolic Execution and Clustering of Binary Security Keys

J Wu, O Dizon-Paradis, S Rahman… - Proceedings of the …, 2024‏ - dforte.ece.ufl.edu
Design-for-test/debug (DfT/D) introduces scan chain testing to increase testability and fault
coverage by inserting scan flip-flops. However, these scan chains are also known to be a …

Package-level counterfeit detection and avoidance

M Tehranipoor, N Pundir, N Vashistha… - Hardware Security …, 2022‏ - Springer
Counterfeit electronic devices have recently emerged as a multi-billion-dollar black market.
A counterfeit part is an illegitimate replica, imitation, substitute, or altered component that …

SANSCrypt: Sporadic-authentication-based sequential logic encryption

Y Hu, K Yang, S Nazarian, P Nuzzo - VLSI-SoC: Design Trends: 28th IFIP …, 2021‏ - Springer
Sequential logic encryption is a countermeasure against reverse engineering of sequential
circuits based on modifying the original finite state machine of the circuit such that the circuit …