Advances in logic locking: Past, present, and prospects

HM Kamali, KZ Azar, F Farahmandi… - Cryptology ePrint …, 2022 - eprint.iacr.org
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …

Defense-in-depth: A recipe for logic locking to prevail

MT Rahman, MS Rahman, H Wang, S Tajik, W Khalil… - Integration, 2020 - Elsevier
Logic locking/obfuscation has emerged as an auspicious solution for protecting the
semiconductor intellectual property (IP) from the untrusted entities in the design and …

The key is left under the mat: On the inappropriate security assumption of logic locking schemes

MT Rahman, S Tajik, MS Rahman… - … Security and Trust …, 2020 - ieeexplore.ieee.org
Logic locking has been proposed as an obfuscation technique to protect outsourced IC
designs from IP piracy by untrusted entities in the design and fabrication process. In this …

Physical inspection & attacks: New frontier in hardware security

MT Rahman, Q Shi, S Tajik, H Shen… - 2018 IEEE 3rd …, 2018 - ieeexplore.ieee.org
Due to globalization, the semiconductor industry is becoming more susceptible to trust and
security issues. Hardware Trojans, ie, malicious modification to integrated circuits (ICs), can …

Toshi-towards secure heterogeneous integration: Security risks, threat assessment, and assurance

N Vashistha, ML Rahman, MSU Haque… - Cryptology ePrint …, 2022 - eprint.iacr.org
The semiconductor industry is entering a new age in which device scaling and cost
reduction will no longer follow the decades-long pattern. Packing more transistors on a …

TAAL: Tampering attack on any key-based logic locked circuits

A Jain, Z Zhou, U Guin - ACM Transactions on Design Automation of …, 2021 - dl.acm.org
Due to the globalization of semiconductor manufacturing and test processes, the system-on-
a-chip (SoC) designers no longer design the complete SoC and manufacture chips on their …

FPGA bitstream security: a day in the life

A Duncan, F Rahman, A Lukefahr… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Security concerns for field-programmable gate array (FPGA) applications and hardware are
evolving as FPGA designs grow in complexity, involve sophisticated intellectual properties …

A twofold clock and voltage-based detection method for laser logic state imaging attack

T Farheen, S Roy, S Tajik… - IEEE Transactions on Very …, 2022 - ieeexplore.ieee.org
Powerful side-channel analysis (SCA) attacks based on failure analysis (FA) techniques can
bypass conventional countermeasures on integrated circuits (ICs) and, therefore, break the …

Hardware security for and beyond CMOS technology: an overview on fundamentals, applications, and challenges

J Knechtel - Proceedings of the 2020 International Symposium on …, 2020 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …

On backside probing techniques and their emerging security threats

LK Biswas, L Lavdas, MT Rahman… - IEEE Design & …, 2022 - ieeexplore.ieee.org
Various probing methodologies have been developed in the semiconductor industry to
perform failure analysis of an integrated circuit. However, these probing techniques can be …