Lle: Mitigating ic piracy and reverse engineering by last level edit

S Rahman, N Varshney, F Farahmandi… - … for Testing and …, 2023 - dl.asminternational.org
Hardware obfuscation is a proactive design-for-trust technique against integrated circuit (IC)
supply chain threats, ie, intellectual property (IP) piracy and overproduction. Many studies …

Improving bounded model checkers scalability for circuit de-obfuscation: An exploration

KZ Azar, HM Kamali, F Farahmandi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the globalization and distribution of the semiconductor supply chain, intellectual
property (IP) protection has become a necessity. Recent years have witnessed a surge of …

EvoLUTe: evaluation of look-up-table-based fine-grained IP redaction

R Guo, MS Rahman, HM Kamali… - … , Automation & Test …, 2023 - ieeexplore.ieee.org
Recent studies on intellectual property (IP) protection techniques demonstrate that engaging
embedded reconfigurable components (eg, eFPGA redaction) would be a promising …

RTLock: IP protection using scan-aware logic locking at RTL

MR Muttaki, S Saha, HM Kamali… - … , Automation & Test …, 2023 - ieeexplore.ieee.org
Conventional logic locking techniques mainly focus on gate-level netlists to combat IP piracy
and IC overproduction. However, this is generally not sufficient for protecting semantics and …

SHI-Lock: Enabling Co-Obfuscation for Secure Heterogeneous Integration Against RE and Cloning

MSU Haque, R Guo, MS Rahman… - 2023 IEEE Physical …, 2023 - ieeexplore.ieee.org
With the limitations of Moore's Law and Dennard scaling in integrated circuits (ICs) on the
horizon, the concept of heterogeneous integration (HI) has gained significant traction as a …

Automated Hardware Security Evaluation Framework Using PSO and CNN for Optimizing Key Gate Placement and Enhanced Security Analysis

B Dhanam, P Marichamy - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
The increasing of integrated circuits complications and the increasing prevalence of third-
party manufacturing facilities have led to growing concerns about the security of hardware …

Infrastructure Supporting Logic Locking

K Zamiri Azar, H Mardani Kamali, F Farahmandi… - Understanding Logic …, 2023 - Springer
Logic locking is a technique used in the IC supply chain to protect intellectual property and
integrated circuits from unauthorized access. However, relying solely on logic locking …

Infrastructure Supporting Logic Locking Check for updates

KZ Azar - Understanding Logic Locking, 2023 - books.google.com
Returning to the conventional definition and prerequisites of logic locking, depicted in Fig.
6.1, it becomes apparent that some additional modifications or steps must be incorporated …

Locking Your IP: A Step-by-Step Guide

K Zamiri Azar, H Mardani Kamali, F Farahmandi… - Understanding Logic …, 2023 - Springer
Logic locking technology has gained significant attention in the field of hardware security
due to its effectiveness in protecting integrated circuits from unauthorized access and …

Analog Security

M Tehranipoor, N Pundir, N Vashistha… - Hardware Security …, 2022 - Springer
Hardware Trojan insertion, cloning, forgery, overproduction, recycling, and reverse
engineering (RE) problems are increasing yearly in the semiconductor supply chain …