Advances in logic locking: Past, present, and prospects
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …
IP protection and supply chain security through logic obfuscation: A systematic overview
The globalization of the semiconductor supply chain introduces ever-increasing security and
privacy risks. Two major concerns are IP theft through reverse engineering and malicious …
privacy risks. Two major concerns are IP theft through reverse engineering and malicious …
Hardware Trojan attacks: Threat analysis and countermeasures
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …
the information being processed. The underlying hardware used for information processing …
Hardware trojans: Lessons learned after one decade of research
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …
from around the globe have become more heavily involved in all phases of the electronics …
Provably-secure logic locking: From theory to practice
Logic locking has been conceived as a promising proactive defense strategy against
intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and …
intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and …
Benchmarking of hardware trojans and maliciously affected circuits
Research in the field of hardware Trojans has seen significant growth in the past decade.
However, standard benchmarks to evaluate hardware Trojans and their detection are …
However, standard benchmarks to evaluate hardware Trojans and their detection are …
A2: Analog malicious hardware
While the move to smaller transistors has been a boon for performance it has dramatically
increased the cost to fabricate chips using those smaller transistors. This forces the vast …
increased the cost to fabricate chips using those smaller transistors. This forces the vast …
SMT attack: Next generation attack on obfuscated circuits with capabilities and performance beyond the SAT attacks
In this paper, we introduce the Satisfiability Modulo Theory (SMT) attack on obfuscated
circuits. The proposed attack is the superset of Satisfiability (SAT) attack, with many …
circuits. The proposed attack is the superset of Satisfiability (SAT) attack, with many …
Keynote: A disquisition on logic locking
The fabless business model has given rise to many security threats, including piracy of
intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and …
intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and …
[PDF][PDF] Integrated circuit (IC) decamouflaging: Reverse engineering camouflaged ICs within minutes.
Circuit camouflaging is a recently proposed defense mechanism to protect digital integrated
circuits (ICs) from reverse engineering attacks by using camouflaged gates, ie, logic gates …
circuits (ICs) from reverse engineering attacks by using camouflaged gates, ie, logic gates …