Results 201 to 210 of about 3,171 (259)

Firearm Storage and Firearm Suicide.

open access: yesJAMA Netw Open
Miller M   +5 more
europepmc   +1 more source

Trace Logic Locking: Improving the Parametric Space of Logic Locking

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021
To protect against an untrusted foundry, logic locking must 1) inject sufficient error to ensure critical application failures for any wrong key (error severity) and 2) resist any attack against it (attack resilient). We begin our work by deriving a fundamental tradeoff between these two goals which exists underlying all logic locking, regardless of ...
Michael Zuzak   +2 more
openaire   +1 more source

Thwarting All Logic Locking Attacks: Dishonest Oracle With Truly Random Logic Locking

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021
While logic locking is a promising defense to protect hardware designs, many attacks have been shown to undermine its security by retrieving the secret key. All the powerful attacks rely on a working chip, i.e., an oracle, and in particular, heavily use the test access.
Nimisha Limaye   +4 more
openaire   +1 more source

Secure Logic Locking with Strain-Protected Nanomagnet Logic

2021 58th ACM/IEEE Design Automation Conference (DAC), 2021
Prevention of integrated circuit counterfeiting through logic locking faces the fundamental challenge of securing an obfuscation key against both physical and algorithmic threats. Previous work has focused on strengthening the logic encryption to protect the key against algorithmic attacks, but failed to provide adequate physical security. In this work,
Naimul Hassan   +12 more
openaire   +1 more source

LOOPLock: Logic Optimization-Based Cyclic Logic Locking

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020
SAT Attack, CycSAT, and Removal Attack have demonstrated their abilities to break most existing logic locking methods. In this article, we propose a new cyclic logic locking method to invalidate these attacks simultaneously. Our main intention is to create noncombinational cycles to lock a circuit.
Hsiao-Yu Chiang   +5 more
openaire   +1 more source

Provably-Secure Logic Locking

Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Logic locking has been conceived as a promising proactive defense strategy against intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and overbuilding attacks. Yet, various attacks that use a working chip as an oracle have been launched on logic locking to successfully retrieve its secret key, undermining the ...
Muhammad Yasin   +5 more
openaire   +1 more source

Evolution of logic locking

2017 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), 2017
The globalization of integrated circuit (IC) supply chain and the emergence of threats, such as intellectual property (IP) piracy, reverse engineering, and hardware Trojans, have forced semiconductor companies to revisit the trust in the supply chain. Logic locking is emerging as a popular and effective countermeasure against these threats.
Muhammad Yasin, Ozgur Sinanoglu
openaire   +1 more source

Logic Locking Induced Fault Attacks

2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2020
Logic locking has been presented in the past as a solution to avoid overproduction or product piracy. All solutions so far assume or rely on the protection of the correct locking key. This paper does not target the break of locking schemes but looks at another highly critical security risk which comes with modified locking keys: The enabling of fault ...
Michaela Brunner   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy