Results 251 to 260 of about 63,047 (284)
Some of the next articles are maybe not open access.
The Impact of Logic Synthesis and Technology Mapping on Logic Locking Security
2024 IFIP/IEEE 32nd International Conference on Very Large Scale Integration (VLSI-SoC)Johann Knechtel
exaly +2 more sources
2019
The first chapter of the book describes the need for logic locking and how it addresses the hardware security challenges faced by the IC design community. The chapter begins with a description of the globalized IC design flow and the associated security threats.
Muhammad Yasin +2 more
openaire +1 more source
The first chapter of the book describes the need for logic locking and how it addresses the hardware security challenges faced by the IC design community. The chapter begins with a description of the globalized IC design flow and the associated security threats.
Muhammad Yasin +2 more
openaire +1 more source
Revisiting Logic Locking for Reversible Computing
2019 IEEE European Test Symposium (ETS), 2019Analogous to CMOS circuits, we can expect attacks such as integrated circuit (IC) counterfeiting, piracy through reverse engineering (RE) or over-production, and insertion of hardware Trojans to be launched on emerging class of reversible circuits, which is a promising alternative to standard CMOS technology.
Nimisha Limaye +2 more
openaire +1 more source
TTLock: Tenacious and traceless logic locking
2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2017Logic locking is an intellectual property (IP) protection technique that prevents IP piracy, reverse engineering and overbuilding attacks by the untrusted foundry or endusers. Existing logic locking techniques are all vulnerable to various attacks, such as sensitization, key-pruning and signal skew analysis enabled removal attacks.
Muhammad Yasin +3 more
openaire +1 more source
Mitigating SAT Attack on Logic Locking
2016Logic locking is a technique that has been proposed to protect outsourced IC designs from piracy and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality only when a correct key is provided. Recently, the security of logic locking is threatened by a new attack called SAT attack, which can decipher the correct key of ...
Yang Xie 0001, Ankur Srivastava 0001
openaire +2 more sources
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Logic locking has been conceived as a promising proactive defense strategy against intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and overbuilding attacks. Yet, various attacks that use a working chip as an oracle have been launched on logic locking to successfully retrieve its secret key, undermining the ...
Muhammad Yasin +5 more
openaire +1 more source
Logic locking has been conceived as a promising proactive defense strategy against intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and overbuilding attacks. Yet, various attacks that use a working chip as an oracle have been launched on logic locking to successfully retrieve its secret key, undermining the ...
Muhammad Yasin +5 more
openaire +1 more source
Locked Circuit Indistinguishability: A Notion of Security for Logic Locking
2022 IEEE 35th Computer Security Foundations Symposium (CSF), 2022Mohamed El Massad +5 more
openaire +1 more source
Locke, Leibniz, and the Logic of Mechanism
Journal of the History of Philosophy, 1998Etude du modele mecaniste d'explication des phenomenes qui a influence Leibniz et Locke dans leur contribution a la science de la nature. Soulevant le probleme de l'interaction esprit-corps et de la definition du pouvoir causal chez Boyle, Mill et Malebranche, l'A.
openaire +1 more source

