Results 251 to 260 of about 1,173,380 (328)
Some of the next articles are maybe not open access.

Logic Locking

, 2023
Dominik Sisejkovic, R. Leupers
semanticscholar   +2 more sources

Trace Logic Locking: Improving the Parametric Space of Logic Locking

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021
To protect against an untrusted foundry, logic locking must 1) inject sufficient error to ensure critical application failures for any wrong key (error severity) and 2) resist any attack against it (attack resilient). We begin our work by deriving a fundamental tradeoff between these two goals which exists underlying all logic locking, regardless of ...
Michael Zuzak   +2 more
openaire   +1 more source

Provably-Secure Logic Locking: From Theory To Practice

Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Logic locking has been conceived as a promising proactive defense strategy against intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and overbuilding attacks. Yet, various attacks that use a working chip as an oracle have been launched on logic locking to successfully retrieve its secret key, undermining the ...
Muhammad Yasin   +5 more
semanticscholar   +2 more sources

SimLL: Similarity-Based Logic Locking Against Machine Learning Attacks

Design Automation Conference, 2023
Logic locking is a promising technique for protecting integrated circuit designs while outsourcing their fabrication. Recently, graph neural network (GNN)-based link prediction attacks have been developed which can successfully break all the multiplexer ...
Subhajit Dutta Chowdhury   +2 more
semanticscholar   +1 more source

OMLA: An Oracle-Less Machine Learning-Based Attack on Logic Locking

IEEE Transactions on Circuits and Systems - II - Express Briefs, 2022
Hardware-based attacks on the semiconductor supply chain are emerging due to the globalization of the design flow. Logic locking is a design-for-trust scheme that promises protection throughout the supply chain.
Lilas Alrahis   +3 more
semanticscholar   +1 more source

Redundancy Attack: Breaking Logic Locking Through Oracleless Rationality Analysis

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023
During the last decade, logic locking has been proposed to protect integrated circuits against piracy and reverse engineering threats. Functional pruning attacks, such as the Boolean satisfiability (SAT) attack, have greatly challenged the security of ...
Leon Li, A. Orailoglu
semanticscholar   +1 more source

SheLL: Shrinking eFPGA Fabrics for Logic Locking

Design, Automation and Test in Europe, 2023
The utilization of fully reconfigurable logic and routing modules may be considered as one potential and even provably resilient technique against intellectual property (IP) piracy and integrated circuits (IC) overproduction. The embedded FPGA (eFPGA) is
Hadi Mardani Kamali   +3 more
semanticscholar   +1 more source

HLock+: A Robust and Low-Overhead Logic Locking at the High-Level Language

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023
With the emergence of the horizontal business model in the semiconductor industry, numerous hardware security concerns have been emerged, including intellectual property (IP) theft, malicious functionality insertion, and IC overproduction.
Md Rafid Muttaki   +4 more
semanticscholar   +1 more source

Discerning Limitations of GNN-based Attacks on Logic Locking

Design Automation Conference, 2023
Machine learning (ML)-based attacks have revealed the possibility of utilizing neural networks to break locked circuits without needing functional chips (Oracle).
A. Darjani   +3 more
semanticscholar   +1 more source

CoLA: Convolutional Neural Network Model for Secure Low Overhead Logic Locking Assignment

ACM Great Lakes Symposium on VLSI, 2023
Chip designers can secure their ICs against piracy and overproduction by employing logic locking and obfuscation. However, there are numerous attacks that can examine the logic-locked netlist with the assistance of an activated IC and extract the correct
Yeganeh Aghamohammadi, Amin Rezaei
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy