Results 241 to 250 of about 462,135 (294)
Some of the next articles are maybe not open access.

SARO: Scalable Attack-Resistant Logic Locking

IEEE Transactions on Information Forensics and Security, 2021
Intellectual property (IP) protection against piracy and reverse engineering (RE) has emerged as a critical area of research in the field of hardware security. Logic locking has been studied as a promising technique to provide robust protection against these attacks.
Abdulrahman Alaql, Swarup Bhunia
openaire   +1 more source

Logic Locking Induced Fault Attacks

2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2020
Logic locking has been presented in the past as a solution to avoid overproduction or product piracy. All solutions so far assume or rely on the protection of the correct locking key. This paper does not target the break of locking schemes but looks at another highly critical security risk which comes with modified locking keys: The enabling of fault ...
Michaela Brunner   +3 more
openaire   +1 more source

Attacks on Logic Locking Obfuscation Techniques

2021 IEEE International Conference on Consumer Electronics (ICCE), 2021
Logic Locking is a relatively new obfuscation technique that is at the forefront of preventing IP theft, piracy, overproduction, and counterfeiting of chips made in contracted foundries. As logic locking develops and new gate insertion techniques are created, their resilience to attacks must be evaluated to know their true effectiveness. In this paper,
Jake Mellor   +3 more
openaire   +1 more source

Network attacks detection using fuzzy logic

2015 XVIII International Conference on Soft Computing and Measurements (SCM), 2015
The aim of research is to increase the network attack detection accuracy by means of fuzzy logic. This paper considers an approach to intrusion detection using fuzzy logic. The approach is based on network monitoring of the variables characteristic of different network anomalies, such as ratio of the incoming traffic to the outgoing, packet size, etc ...
D. K. Levonevskiy   +2 more
openaire   +1 more source

Sequential Logic Encryption Against Model Checking Attack

2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021
Due to high IC design costs and emergence of countless untrusted foundries, logic encryption has been taken into consideration more than ever. In state-of-the-art logic encryption works, a lot of performance is sold to guarantee security against both the SAT-based and the removal attacks.
Amin Rezaei, Hai Zhou
openaire   +1 more source

Shielding Logic Locking from Redundancy Attacks

2019 IEEE 37th VLSI Test Symposium (VTS), 2019
The security of logic locking has been extensively examined under the threat model that assumes the availability of an activated IC. Recently, structural attacks such as ones based on redundancy analysis have challenged the viability of logic locking even when stringent measures are taken to preclude access to an activated IC. In this paper, we propose
Leon Li, Alex Orailoglu
openaire   +1 more source

SARLock: SAT attack resistant logic locking

2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2016
Logic locking is an Intellectual Property (IP) protection technique that thwarts IP piracy, hardware Trojans, reverse engineering, and IC overproduction. Researchers have taken multiple attempts in breaking logic locking techniques and recovering its secret key. A Boolean Satisfiability (SAT) based attack has been recently presented that breaks all the
Muhammad Yasin   +3 more
openaire   +1 more source

The Attack on Logicism

1992
Poincare argued that logicism fails because the logicist cannot show that the epistemological source of the concepts required for the logicist derivation of arithmetic is really logic. Indeed, Poincare believed that the concept of indefinite iterability — of the ability to iterate or repeat (for example, the application of a rule, like ‘+’) without ...
openaire   +1 more source

On Optical Attacks Making Logic Obfuscation Fragile

2020 IEEE International Test Conference in Asia (ITC-Asia), 2020
The backside of modern Integrated Circuits (ICs) is becoming an open backdoor for malicious hardware attackers to take advantage of. Aided by new Failure Analysis (FA) optical techniques, e.g., Photon Emission Analysis (PEA), optical probing, and Laser Fault Injection (LFI), hackers pose a serious threat to the confidentiality, integrity and ...
Leonidas Lavdas   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy