Results 11 to 20 of about 1,173,380 (328)
Thwarting All Logic Locking Attacks: Dishonest Oracle With Truly Random Logic Locking
While logic locking is a promising defense to protect hardware designs, many attacks have been shown to undermine its security by retrieving the secret key. All the powerful attacks rely on a working chip, i.e., an oracle, and in particular, heavily use the test access.
Nimisha Limaye +4 more
semanticscholar +2 more sources
Keynote: A Disquisition on Logic Locking
The fabless business model has given rise to many security threats, including piracy of intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and hardware Trojans (HT).
Abhishek Chakraborty +8 more
semanticscholar +2 more sources
Modeling techniques for logic locking [PDF]
Logic locking is a method to prevent intellectual property (IP) piracy. However, under a reasonable attack model, SAT-based methods have proven to be powerful in obtaining the secret key. In response, many locking techniques have been developed to specifically resist this form of attack.
Sweeney, Joseph +2 more
openaire +2 more sources
Latch-Based Logic Locking [PDF]
Globalization of IC manufacturing has led to increased security concerns, notably IP theft. Several logic locking techniques have been developed for protecting designs, but they typically display very large overhead, and are generally susceptible to deciphering attacks.
Sweeney, Joseph +3 more
openaire +2 more sources
AutoLock: Automatic Design of Logic Locking with Evolutionary Computation [PDF]
Logic locking protects the integrity of hardware designs throughout the integrated circuit supply chain. However, recent machine learning (ML)-based attacks have challenged its fundamental security, initiating the requirement for the design of learning ...
Zeng Wang +3 more
semanticscholar +1 more source
A Security Analysis of Circuit Clock Obfuscation
Key-based circuit obfuscation or logic-locking is a technique that can be used to hide the full design of an integrated circuit from an untrusted foundry or end-user. The technique is based on creating ambiguity in the original circuit by inserting “key”
Rajesh Datta +3 more
doaj +1 more source
Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators [PDF]
Logic locking has been proposed to safeguard intellectual property (IP) during chip fabrication. Logic locking techniques protect hardware IP by making a subset of combinational modules in a design dependent on a secret key that is withheld from ...
Hongye Xu +3 more
semanticscholar +1 more source
Noise‐based logic locking scheme against signal probability skew analysis
Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats.
Ahmad Rezaei, Ali Mahani
doaj +1 more source
Modelling earthquake rates and associated uncertainties in the Marmara Region, Turkey [PDF]
Modelling the seismic potential of active faults and the associated epistemic uncertainty is a fundamental step of probabilistic seismic hazard assessment (PSHA).
T. Chartier +7 more
doaj +1 more source
In recent years, discovering various vulnerabilities in the IC supply chain has raised security concerns in electronic systems. Recent research has proposed numerous attack and defense mechanisms involving various nanoelectronic devices.
Divyanshu Divyanshu +4 more
semanticscholar +1 more source

