Advances in logic locking: Past, present, and prospects

HM Kamali, KZ Azar, F Farahmandi… - Cryptology ePrint …, 2022 - eprint.iacr.org
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …

IP protection and supply chain security through logic obfuscation: A systematic overview

K Shamsi, M Li, K Plaks, S Fazzari, DZ Pan… - ACM Transactions on …, 2019 - dl.acm.org
The globalization of the semiconductor supply chain introduces ever-increasing security and
privacy risks. Two major concerns are IP theft through reverse engineering and malicious …

Hardware Trojan attacks: Threat analysis and countermeasures

S Bhunia, MS Hsiao, M Banga… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …

Hardware trojans: Lessons learned after one decade of research

K **ao, D Forte, Y **, R Karri, S Bhunia… - ACM Transactions on …, 2016 - dl.acm.org
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …

Provably-secure logic locking: From theory to practice

M Yasin, A Sengupta, MT Nabeel, M Ashraf… - Proceedings of the …, 2017 - dl.acm.org
Logic locking has been conceived as a promising proactive defense strategy against
intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and …

Benchmarking of hardware trojans and maliciously affected circuits

B Shakya, T He, H Salmani, D Forte, S Bhunia… - Journal of Hardware and …, 2017 - Springer
Research in the field of hardware Trojans has seen significant growth in the past decade.
However, standard benchmarks to evaluate hardware Trojans and their detection are …

A2: Analog malicious hardware

K Yang, M Hicks, Q Dong, T Austin… - 2016 IEEE symposium …, 2016 - ieeexplore.ieee.org
While the move to smaller transistors has been a boon for performance it has dramatically
increased the cost to fabricate chips using those smaller transistors. This forces the vast …

SMT attack: Next generation attack on obfuscated circuits with capabilities and performance beyond the SAT attacks

KZ Azar, HM Kamali, H Homayoun… - IACR Transactions on …, 2019 - tches.iacr.org
In this paper, we introduce the Satisfiability Modulo Theory (SMT) attack on obfuscated
circuits. The proposed attack is the superset of Satisfiability (SAT) attack, with many …

Keynote: A disquisition on logic locking

A Chakraborty, NG Jayasankaran, Y Liu… - … on Computer-Aided …, 2019 - ieeexplore.ieee.org
The fabless business model has given rise to many security threats, including piracy of
intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and …

[PDF][PDF] Integrated circuit (IC) decamouflaging: Reverse engineering camouflaged ICs within minutes.

M El Massad, S Garg, MV Tripunitara - NDSS, 2015 - academia.edu
Circuit camouflaging is a recently proposed defense mechanism to protect digital integrated
circuits (ICs) from reverse engineering attacks by using camouflaged gates, ie, logic gates …