Logic locking for IP security: A comprehensive analysis on challenges, techniques, and trends

J Gandhi, D Shekhawat, M Santosh, JG Pandey - Computers & Security, 2023 - Elsevier
A substantial part of the Integrated Circuit (IC) supply chain that involves semiconductor
fabrication, packaging, and testing has shifted globally to minimize IC costs and satisfy …

DBXplorer: enabling keyword search over relational databases

S Agrawal, S Chaudhuri, G Das - Proceedings of the 2002 ACM SIGMOD …, 2002 - dl.acm.org
Figure 1 shows the various steps of the search component. Given a set of query keywords,
the system first uses the symbol table to determine the locations within the database where …

Challenging the security of logic locking schemes in the era of deep learning: A neuroevolutionary approach

D Sisejkovic, F Merchant, LM Reimann… - ACM Journal on …, 2021 - dl.acm.org
Logic locking is a prominent technique to protect the integrity of hardware designs
throughout the integrated circuit design and fabrication flow. However, in recent years, the …

A survey of digital circuit testing in the light of machine learning

M Pradhan, BB Bhattacharya - Wiley Interdisciplinary Reviews …, 2021 - Wiley Online Library
The insistent trend in today's nanoscale technology, to keep abreast of the Moore's law, has
been continually opening up newer challenges to circuit designers. With rapid downscaling …

ReTrustFSM: toward RTL hardware obfuscation-a hybrid FSM approach

MS Rahman, R Guo, HM Kamali, F Rahman… - IEEE …, 2023 - ieeexplore.ieee.org
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain
threats, ie, IP piracy and overproduction. Many studies have evaluated numerous …

Conflict-free colorings of simple geometric regions with applications to frequency assignment in cellular networks

G Even, Z Lotker, D Ron, S Smorodinsky - SIAM Journal on Computing, 2003 - SIAM
Motivated by a frequency assignment problem in cellular networks, we introduce and study a
new coloring problem that we call minimum conflict-free coloring (min-CF-coloring). In its …

Mitigating electrical-level attacks towards secure multi-tenant FPGAs in the cloud

J Krautter, DRE Gnad, MB Tahoori - ACM Transactions on …, 2019 - dl.acm.org
A rising trend is the use of multi-tenant FPGAs, particularly in cloud environments, where
partial access to the hardware is given to multiple third parties. This leads to new types of …

Reverse engineering camouflaged sequential circuits without scan access

M El Massad, S Garg… - 2017 IEEE/ACM …, 2017 - ieeexplore.ieee.org
Integrated circuit (IC) camouflaging is a promising technique to protect the design of a chip
from reverse engineering. However, recent work has shown that even camouflaged ICs can …

Deceptive logic locking for hardware integrity protection against machine learning attacks

D Sisejkovic, F Merchant, LM Reimann… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Logic locking has emerged as a prominent key-driven technique to protect the integrity of
integrated circuits. However, novel machine-learning-based attacks have recently been …

Assessment of the impact of the freshman engineering courses

D Budny, G Bjedov, W LeBold - … and Learning in an Era of …, 1997 - ieeexplore.ieee.org
This study is based on historical data for a 28 year period, from 1966 through 1993. The
study evaluates if the freshmen engineering courses supply the entering engineering …