Logic locking for IP security: a comprehensive analysis on challenges, techniques, and trends

J Gandhi, D Shekhawat, M Santosh, JG Pandey - Computers & Security, 2023 - Elsevier
A substantial part of the Integrated Circuit (IC) supply chain that involves semiconductor
fabrication, packaging, and testing has shifted globally to minimize IC costs and satisfy …

A comprehensive survey on non-invasive fault injection attacks

AM Shuvo, T Zhang, F Farahmandi… - Cryptology ePrint …, 2023 - eprint.iacr.org
Non-invasive fault injection attacks have emerged as significant threats to a spectrum of
microelectronic systems ranging from commodity devices to high-end customized …

{AttackGNN}:{Red-Teaming}{GNNs} in Hardware Security Using Reinforcement Learning

V Gohil, S Patnaik, D Kalathil, J Rajendran - 33rd USENIX Security …, 2024 - usenix.org
Machine learning has shown great promise in addressing several critical hardware security
problems. In particular, researchers have developed novel graph neural network (GNN) …

SPILL—Security Properties and Machine-Learning Assisted Pre-Silicon Laser Fault Injection Assessment

N Pundir, H Li, L Lin, N Chang… - … for Testing and …, 2022 - dl.asminternational.org
Laser-based fault injection (LFI) attacks are powerful physical attacks with high precision
and controllability. Therefore, attempts have been in the literature to model and simulate the …

[HTML][HTML] A Methodology to Distribute On-Chip Voltage Regulators to Improve the Security of Hardware Masking

S Seçkiner, S Köse - Information, 2024 - mdpi.com
Hardware masking is used to protect against side-channel attacks by splitting sensitive
information into different parts, called hardware masking shares. Ideally, a side-channel …

Security implications of decoupling capacitors on leakage reduction in hardware masking

S Seçkiner, S Köse - 2023 IEEE 14th Latin America Symposium …, 2023 - ieeexplore.ieee.org
Hardware masking is a countermeasure against side-channel attacks and aims to separate
sensitive information to be processed into multiple shares. Ideally, a side-channel attack can …

[HTML][HTML] Exploiting on-chip voltage regulators for leakage reduction in hardware masking

S Seçkiner, S Köse - Sensors, 2022 - mdpi.com
A design space exploration of the countermeasures for hardware masking is proposed in
this paper. The assumption of independence among shares used in hardware masking can …

CAD for Fault Injection Detection

F Farahmandi, MS Rahman, SR Rajendran… - CAD for Hardware …, 2023 - Springer
As integrated circuits become smaller and more complex, probing of vulnerability to various
invasive and non-invasive attacks. Fault injection aggressors can seriously affect a device's …

Systematic Literature Review of EM-SCA Attacks on Encryption

MR Zunaidi, A Sayakkara, M Scanlon - arxiv preprint arxiv:2402.10030, 2024 - arxiv.org
Cryptography is vital for data security, but cryptographic algorithms can still be vulnerable to
side-channel attacks (SCAs), physical assaults exploiting power consumption and EM …

Universal Fault Sensor

M Tehranipoor, N Nalla Anandakumar… - … Security Training, Hands …, 2023 - Springer
Over the past two decades, fault injection methods have evolved into very effective attacks to
cause integrity or confidentiality violations in integrated circuits or electronic systems. Fault …