Results 241 to 250 of about 462,135 (294)
Some of the next articles are maybe not open access.
SARO: Scalable Attack-Resistant Logic Locking
IEEE Transactions on Information Forensics and Security, 2021Intellectual property (IP) protection against piracy and reverse engineering (RE) has emerged as a critical area of research in the field of hardware security. Logic locking has been studied as a promising technique to provide robust protection against these attacks.
Abdulrahman Alaql, Swarup Bhunia
openaire +1 more source
Logic Locking Induced Fault Attacks
2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2020Logic locking has been presented in the past as a solution to avoid overproduction or product piracy. All solutions so far assume or rely on the protection of the correct locking key. This paper does not target the break of locking schemes but looks at another highly critical security risk which comes with modified locking keys: The enabling of fault ...
Michaela Brunner +3 more
openaire +1 more source
Attacks on Logic Locking Obfuscation Techniques
2021 IEEE International Conference on Consumer Electronics (ICCE), 2021Logic Locking is a relatively new obfuscation technique that is at the forefront of preventing IP theft, piracy, overproduction, and counterfeiting of chips made in contracted foundries. As logic locking develops and new gate insertion techniques are created, their resilience to attacks must be evaluated to know their true effectiveness. In this paper,
Jake Mellor +3 more
openaire +1 more source
Network attacks detection using fuzzy logic
2015 XVIII International Conference on Soft Computing and Measurements (SCM), 2015The aim of research is to increase the network attack detection accuracy by means of fuzzy logic. This paper considers an approach to intrusion detection using fuzzy logic. The approach is based on network monitoring of the variables characteristic of different network anomalies, such as ratio of the incoming traffic to the outgoing, packet size, etc ...
D. K. Levonevskiy +2 more
openaire +1 more source
Sequential Logic Encryption Against Model Checking Attack
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021Due to high IC design costs and emergence of countless untrusted foundries, logic encryption has been taken into consideration more than ever. In state-of-the-art logic encryption works, a lot of performance is sold to guarantee security against both the SAT-based and the removal attacks.
Amin Rezaei, Hai Zhou
openaire +1 more source
Shielding Logic Locking from Redundancy Attacks
2019 IEEE 37th VLSI Test Symposium (VTS), 2019The security of logic locking has been extensively examined under the threat model that assumes the availability of an activated IC. Recently, structural attacks such as ones based on redundancy analysis have challenged the viability of logic locking even when stringent measures are taken to preclude access to an activated IC. In this paper, we propose
Leon Li, Alex Orailoglu
openaire +1 more source
SARLock: SAT attack resistant logic locking
2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2016Logic locking is an Intellectual Property (IP) protection technique that thwarts IP piracy, hardware Trojans, reverse engineering, and IC overproduction. Researchers have taken multiple attempts in breaking logic locking techniques and recovering its secret key. A Boolean Satisfiability (SAT) based attack has been recently presented that breaks all the
Muhammad Yasin +3 more
openaire +1 more source
1992
Poincare argued that logicism fails because the logicist cannot show that the epistemological source of the concepts required for the logicist derivation of arithmetic is really logic. Indeed, Poincare believed that the concept of indefinite iterability — of the ability to iterate or repeat (for example, the application of a rule, like ‘+’) without ...
openaire +1 more source
Poincare argued that logicism fails because the logicist cannot show that the epistemological source of the concepts required for the logicist derivation of arithmetic is really logic. Indeed, Poincare believed that the concept of indefinite iterability — of the ability to iterate or repeat (for example, the application of a rule, like ‘+’) without ...
openaire +1 more source
On Optical Attacks Making Logic Obfuscation Fragile
2020 IEEE International Test Conference in Asia (ITC-Asia), 2020The backside of modern Integrated Circuits (ICs) is becoming an open backdoor for malicious hardware attackers to take advantage of. Aided by new Failure Analysis (FA) optical techniques, e.g., Photon Emission Analysis (PEA), optical probing, and Laser Fault Injection (LFI), hackers pose a serious threat to the confidentiality, integrity and ...
Leonidas Lavdas +3 more
openaire +1 more source

