Results 11 to 20 of about 1,173,380 (328)

Thwarting All Logic Locking Attacks: Dishonest Oracle With Truly Random Logic Locking

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021
While logic locking is a promising defense to protect hardware designs, many attacks have been shown to undermine its security by retrieving the secret key. All the powerful attacks rely on a working chip, i.e., an oracle, and in particular, heavily use the test access.
Nimisha Limaye   +4 more
semanticscholar   +2 more sources

Keynote: A Disquisition on Logic Locking

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020
The fabless business model has given rise to many security threats, including piracy of intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and hardware Trojans (HT).
Abhishek Chakraborty   +8 more
semanticscholar   +2 more sources

Modeling techniques for logic locking [PDF]

open access: yesProceedings of the 39th International Conference on Computer-Aided Design, 2020
Logic locking is a method to prevent intellectual property (IP) piracy. However, under a reasonable attack model, SAT-based methods have proven to be powerful in obtaining the secret key. In response, many locking techniques have been developed to specifically resist this form of attack.
Sweeney, Joseph   +2 more
openaire   +2 more sources

Latch-Based Logic Locking [PDF]

open access: yes2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2020
Globalization of IC manufacturing has led to increased security concerns, notably IP theft. Several logic locking techniques have been developed for protecting designs, but they typically display very large overhead, and are generally susceptible to deciphering attacks.
Sweeney, Joseph   +3 more
openaire   +2 more sources

AutoLock: Automatic Design of Logic Locking with Evolutionary Computation [PDF]

open access: yes2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S), 2023
Logic locking protects the integrity of hardware designs throughout the integrated circuit supply chain. However, recent machine learning (ML)-based attacks have challenged its fundamental security, initiating the requirement for the design of learning ...
Zeng Wang   +3 more
semanticscholar   +1 more source

A Security Analysis of Circuit Clock Obfuscation

open access: yesCryptography, 2022
Key-based circuit obfuscation or logic-locking is a technique that can be used to hide the full design of an integrated circuit from an untrusted foundry or end-user. The technique is based on creating ambiguity in the original circuit by inserting “key”
Rajesh Datta   +3 more
doaj   +1 more source

Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators [PDF]

open access: yesACM Great Lakes Symposium on VLSI, 2023
Logic locking has been proposed to safeguard intellectual property (IP) during chip fabrication. Logic locking techniques protect hardware IP by making a subset of combinational modules in a design dependent on a secret key that is withheld from ...
Hongye Xu   +3 more
semanticscholar   +1 more source

Noise‐based logic locking scheme against signal probability skew analysis

open access: yesIET Computers & Digital Techniques, 2021
Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats.
Ahmad Rezaei, Ali Mahani
doaj   +1 more source

Modelling earthquake rates and associated uncertainties in the Marmara Region, Turkey [PDF]

open access: yesNatural Hazards and Earth System Sciences, 2021
Modelling the seismic potential of active faults and the associated epistemic uncertainty is a fundamental step of probabilistic seismic hazard assessment (PSHA).
T. Chartier   +7 more
doaj   +1 more source

An Approach towards Designing Logic Locking Using Shape-Perpendicular Magnetic Anisotropy-Double Layer MTJ

open access: yesElectronics, 2023
In recent years, discovering various vulnerabilities in the IC supply chain has raised security concerns in electronic systems. Recent research has proposed numerous attack and defense mechanisms involving various nanoelectronic devices.
Divyanshu Divyanshu   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy