Advances in logic locking: Past, present, and prospects
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …
Defense-in-depth: A recipe for logic locking to prevail
Logic locking/obfuscation has emerged as an auspicious solution for protecting the
semiconductor intellectual property (IP) from the untrusted entities in the design and …
semiconductor intellectual property (IP) from the untrusted entities in the design and …
The key is left under the mat: On the inappropriate security assumption of logic locking schemes
Logic locking has been proposed as an obfuscation technique to protect outsourced IC
designs from IP piracy by untrusted entities in the design and fabrication process. In this …
designs from IP piracy by untrusted entities in the design and fabrication process. In this …
Physical inspection & attacks: New frontier in hardware security
Due to globalization, the semiconductor industry is becoming more susceptible to trust and
security issues. Hardware Trojans, ie, malicious modification to integrated circuits (ICs), can …
security issues. Hardware Trojans, ie, malicious modification to integrated circuits (ICs), can …
Toshi-towards secure heterogeneous integration: Security risks, threat assessment, and assurance
The semiconductor industry is entering a new age in which device scaling and cost
reduction will no longer follow the decades-long pattern. Packing more transistors on a …
reduction will no longer follow the decades-long pattern. Packing more transistors on a …
TAAL: Tampering attack on any key-based logic locked circuits
Due to the globalization of semiconductor manufacturing and test processes, the system-on-
a-chip (SoC) designers no longer design the complete SoC and manufacture chips on their …
a-chip (SoC) designers no longer design the complete SoC and manufacture chips on their …
FPGA bitstream security: a day in the life
Security concerns for field-programmable gate array (FPGA) applications and hardware are
evolving as FPGA designs grow in complexity, involve sophisticated intellectual properties …
evolving as FPGA designs grow in complexity, involve sophisticated intellectual properties …
A twofold clock and voltage-based detection method for laser logic state imaging attack
Powerful side-channel analysis (SCA) attacks based on failure analysis (FA) techniques can
bypass conventional countermeasures on integrated circuits (ICs) and, therefore, break the …
bypass conventional countermeasures on integrated circuits (ICs) and, therefore, break the …
Hardware security for and beyond CMOS technology: an overview on fundamentals, applications, and challenges
J Knechtel - Proceedings of the 2020 International Symposium on …, 2020 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …
traditionally evolved around the dominant CMOS technology. However, with the rise of …
On backside probing techniques and their emerging security threats
Various probing methodologies have been developed in the semiconductor industry to
perform failure analysis of an integrated circuit. However, these probing techniques can be …
perform failure analysis of an integrated circuit. However, these probing techniques can be …