Results 271 to 280 of about 1,173,380 (328)
Some of the next articles are maybe not open access.
On the Efficacy and Vulnerabilities of Logic Locking in Tree-Based Machine Learning
IEEE Transactions on Circuits and Systems Part 1: Regular PapersThe popularity and widespread usage of machine learning (ML) hardware have created challenges for its intellectual property (IP) protection. Logic locking is a widely used technique for IP protection but has received little attention in error-resilient ...
Brunno Alves de Abreu +6 more
semanticscholar +1 more source
LOOPLock 3.0: A Robust Cyclic Logic Locking Approach
Asia and South Pacific Design Automation ConferenceCyclic logic locking is a cutting-edge hardware security method developed to defend against SAT Attack. It introduces cycles into the original circuit, which can cause the circuit to either get trapped in an endless loop or generate incorrect outputs if ...
Pei-Pei Chen +5 more
semanticscholar +1 more source
Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques
IEEE Transactions on Information Forensics and Security, 2022Protection of the design intellectual property (IP) has become a pertinent need owing to the globalized integrated circuit (IC) supply chain. Logic locking has been perceived as a holistic solution ensuring protection against multiple supply chain ...
Nimisha Limaye +2 more
semanticscholar +1 more source
GateLock: Input-Dependent Key-Based Locked Gates for SAT Resistant Logic Locking
IEEE Transactions on Very Large Scale Integration (VLSI) SystemsLogic locking has become a robust method for reducing the risk of intellectual property (IP) piracy, overbuilding, and hardware Trojan threats throughout the lifespan of integrated circuits (ICs).
Vijaypal Singh Rathor +3 more
semanticscholar +1 more source
SARO: Scalable Attack-Resistant Logic Locking
IEEE Transactions on Information Forensics and Security, 2021Intellectual property (IP) protection against piracy and reverse engineering (RE) has emerged as a critical area of research in the field of hardware security. Logic locking has been studied as a promising technique to provide robust protection against these attacks.
Abdulrahman Alaql, Swarup Bhunia
openaire +1 more source
IEEE Transactions on Emerging Topics in Computing, 2022
Leading-edge design houses outsource the fabrication process to pure-play foundries eliminating the expenses of owning and maintaining a fab. The intellectual property (IP) of an outsourced design is now subject to IP piracy, which drives the need for a ...
Lilas Alrahis +5 more
semanticscholar +1 more source
Leading-edge design houses outsource the fabrication process to pure-play foundries eliminating the expenses of owning and maintaining a fab. The intellectual property (IP) of an outsourced design is now subject to IP piracy, which drives the need for a ...
Lilas Alrahis +5 more
semanticscholar +1 more source
Thwarting GNN-Based Attacks Against Logic Locking
IEEE Transactions on Information Forensics and SecurityThe globalization of the IC manufacturing flow has exposed intellectual property (IP) to many untrustworthy entities. As a result, security should be considered a new paradigm in designing circuits to protect the integrity and confidentiality of the IP ...
A. Darjani +3 more
semanticscholar +1 more source
TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans
arXiv.orgDue to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise to many security threats, like piracy of IC intellectual property or insertion of ...
Fangzhou Wang +9 more
semanticscholar +1 more source
LOOPLock 2.0: An Enhanced Cyclic Logic Locking Approach
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2022LOOPLock is the state-of-the-art cyclic logic locking method in hardware security. LOOPLock is able to invalidate SAT Attack, Removal Attack, and CycSAT simultaneously by introducing two types of cycle pairs in a circuit.
Xiang-Min Yang +5 more
semanticscholar +1 more source
Trustworthy Hardware Design with Logic Locking
2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), 2021As the designated root of trust, hardware is undoubtedly the most critical layer to security in modern electronic systems. Protecting its integrity throughout the integrated circuit supply chain is of paramount importance. Logic locking has become a prominent tool to safeguard hardware against malicious design modifications.
Dominik Sisejkovic, Rainer Leupers
openaire +1 more source

