Results 201 to 210 of about 3,171 (259)
Internet Penetration and Leisure Activity Entropy: A Macro-Micro Integrated Analysis. [PDF]
Li H, Dai J.
europepmc +1 more source
An artifact-robust framework for measuring tCS effects during stimulation
Noury N, Damiani F, Siegel M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Trace Logic Locking: Improving the Parametric Space of Logic Locking
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021To protect against an untrusted foundry, logic locking must 1) inject sufficient error to ensure critical application failures for any wrong key (error severity) and 2) resist any attack against it (attack resilient). We begin our work by deriving a fundamental tradeoff between these two goals which exists underlying all logic locking, regardless of ...
Michael Zuzak +2 more
openaire +1 more source
Thwarting All Logic Locking Attacks: Dishonest Oracle With Truly Random Logic Locking
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021While logic locking is a promising defense to protect hardware designs, many attacks have been shown to undermine its security by retrieving the secret key. All the powerful attacks rely on a working chip, i.e., an oracle, and in particular, heavily use the test access.
Nimisha Limaye +4 more
openaire +1 more source
Secure Logic Locking with Strain-Protected Nanomagnet Logic
2021 58th ACM/IEEE Design Automation Conference (DAC), 2021Prevention of integrated circuit counterfeiting through logic locking faces the fundamental challenge of securing an obfuscation key against both physical and algorithmic threats. Previous work has focused on strengthening the logic encryption to protect the key against algorithmic attacks, but failed to provide adequate physical security. In this work,
Naimul Hassan +12 more
openaire +1 more source
LOOPLock: Logic Optimization-Based Cyclic Logic Locking
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020SAT Attack, CycSAT, and Removal Attack have demonstrated their abilities to break most existing logic locking methods. In this article, we propose a new cyclic logic locking method to invalidate these attacks simultaneously. Our main intention is to create noncombinational cycles to lock a circuit.
Hsiao-Yu Chiang +5 more
openaire +1 more source
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Logic locking has been conceived as a promising proactive defense strategy against intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and overbuilding attacks. Yet, various attacks that use a working chip as an oracle have been launched on logic locking to successfully retrieve its secret key, undermining the ...
Muhammad Yasin +5 more
openaire +1 more source
Logic locking has been conceived as a promising proactive defense strategy against intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and overbuilding attacks. Yet, various attacks that use a working chip as an oracle have been launched on logic locking to successfully retrieve its secret key, undermining the ...
Muhammad Yasin +5 more
openaire +1 more source
2017 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), 2017
The globalization of integrated circuit (IC) supply chain and the emergence of threats, such as intellectual property (IP) piracy, reverse engineering, and hardware Trojans, have forced semiconductor companies to revisit the trust in the supply chain. Logic locking is emerging as a popular and effective countermeasure against these threats.
Muhammad Yasin, Ozgur Sinanoglu
openaire +1 more source
The globalization of integrated circuit (IC) supply chain and the emergence of threats, such as intellectual property (IP) piracy, reverse engineering, and hardware Trojans, have forced semiconductor companies to revisit the trust in the supply chain. Logic locking is emerging as a popular and effective countermeasure against these threats.
Muhammad Yasin, Ozgur Sinanoglu
openaire +1 more source
Logic Locking Induced Fault Attacks
2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2020Logic locking has been presented in the past as a solution to avoid overproduction or product piracy. All solutions so far assume or rely on the protection of the correct locking key. This paper does not target the break of locking schemes but looks at another highly critical security risk which comes with modified locking keys: The enabling of fault ...
Michaela Brunner +3 more
openaire +1 more source

