Results 21 to 30 of about 1,173,380 (328)

ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

open access: yesIEEE Access, 2023
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes.
M. Sazadur Rahman   +5 more
doaj   +1 more source

Robust Logic locking for Securing Reusable DSP Cores

open access: yesIEEE Access, 2019
A System on Chip (SoC) used in Consumer Electronics (CE) systems integrates a number of reusable Intellectual Property (IP) cores from digital signal processing (DSP), multimedia etc.
Mahendra Rathor, Anirban Sengupta
doaj   +1 more source

A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL

open access: yesCryptography, 2022
Split manufacturing was introduced as a countermeasure against hardware-level security threats such as IP piracy, overbuilding, and insertion of hardware Trojans. However, the security promise of split manufacturing has been challenged by various attacks
Abhrajit Sengupta   +4 more
doaj   +1 more source

Deceptive Logic Locking for Hardware Integrity Protection Against Machine Learning Attacks [PDF]

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021
Logic locking has emerged as a prominent key-driven technique to protect the integrity of integrated circuits. However, novel machine-learning-based attacks have recently been introduced to challenge the security foundations of locking schemes.
Dominik Sisejkovic   +3 more
semanticscholar   +1 more source

Integrating model checking with HiP-HOPS in model-based safety analysis [PDF]

open access: yes, 2014
The ability to perform an effective and robust safety analysis on the design of modern safety–critical systems is crucial. Model-based safety analysis (MBSA) has been introduced in recent years to support the assessment of complex system design by ...
Papadopoulos, Yiannis   +1 more
core   +1 more source

LIPSTICK: Corruptibility-Aware and Explainable Graph Neural Network-based Oracle-Less Attack on Logic Locking [PDF]

open access: yesAsia and South Pacific Design Automation Conference
In a zero-trust fabless paradigm, designers are increasingly concerned about hardware-based attacks on the semiconductor supply chain. Logic locking is a design-for-trust method that adds extra key-controlled gates in the circuits to prevent hardware ...
Yeganeh Aghamohammadi, Amin Rezaei
semanticscholar   +1 more source

CAC 2.0: A Corrupt and Correct Logic Locking Technique Resilient to Structural Analysis Attacks [PDF]

open access: yesLatin American Test Symposium
Logic locking proposed to protect integrated circuits from serious hardware threats has been studied extensively over a decade. In these years, many logic locking techniques have been proven to be broken.
Levent Aksoy   +2 more
semanticscholar   +1 more source

Regenerative Braking Logic That Maximizes Energy Recovery Ensuring the Vehicle Stability

open access: yesEnergies, 2022
This paper presents a regenerative braking logic that aims to maximize the recovery of energy during braking without compromising the stability of the vehicle. This model of regenerative braking ensures that the regenerative torque of the electric motor (
Giulia Sandrini   +2 more
doaj   +1 more source

The potential of programmable logic in the middle: cache bleaching [PDF]

open access: yes, 2020
Consolidating hard real-time systems onto modern multi-core Systems-on-Chip (SoC) is an open challenge. The extensive sharing of hardware resources at the memory hierarchy raises important unpredictability concerns.
Mancuso, Renato, Roozkhosh, Shahin
core   +1 more source

Threats on Logic Locking

open access: yesProceedings of the 2019 Great Lakes Symposium on VLSI, 2019
To reduce the cost of ICs and to meet the market's demand, a considerable portion of manufacturing supply chain, including silicon fabrication, packaging and testing may be pushed offshore. Utilizing a global IC manufacturing supply chain, and inclusion of non-trusted parties in the supply chain has raised concerns over security and trust related ...
Azar, Kimia Zamiri   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy