Results 241 to 250 of about 400,990 (266)
Some of the next articles are maybe not open access.
Increased Output Corruption and Structural Attack Resilience for SAT Attack Secure Logic Locking
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021Current out-of-cone logic locking methodologies provide resilience against the satisfiability (SAT) attack with minimal corruption of the outputs when comparing an activated and locked integrated circuit (IC). In addition, the structure of the modifications to the original logic leaks functional information of the circuit, which allows an adversary to ...
Kyle Juretus, Ioannis Savidis
openaire +1 more source
2019
This chapter elaborates on the SAT attack, which breaks all pre-SAT logic locking techniques. The SAT attack is an oracle-guided attack that utilizes a SAT solver to compute attack patterns that refine the key search space iteratively. The SAT attack has changed the direction of logic locking research; developing efficient countermeasures against the ...
Muhammad Yasin +2 more
openaire +1 more source
This chapter elaborates on the SAT attack, which breaks all pre-SAT logic locking techniques. The SAT attack is an oracle-guided attack that utilizes a SAT solver to compute attack patterns that refine the key search space iteratively. The SAT attack has changed the direction of logic locking research; developing efficient countermeasures against the ...
Muhammad Yasin +2 more
openaire +1 more source
ACM Transactions on Design Automation of Electronic Systems, 2018
Logic encryption is an IC protection technique for preventing an IC design from overproduction and unauthorized use. It hides a design’s functionality by inserting key gates and key inputs, such that a secret key is required to activate the design and make it functioncorrectly.
openaire +1 more source
Logic encryption is an IC protection technique for preventing an IC design from overproduction and unauthorized use. It hides a design’s functionality by inserting key gates and key inputs, such that a secret key is required to activate the design and make it functioncorrectly.
openaire +1 more source
Attacking Bivium Using SAT Solvers
2008In this paper we present experimental results of an application of SAT solvers in current cryptography. Trivium is a very promising stream cipher candidate in the final phase of the eSTREAM project. We use the fastest industrial SAT solvers to attack a reduced version of Trivium - called Bivium.
Tobias Eibach +2 more
openaire +1 more source
SAT Based Partial Attack on Compound Logic Locking
2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 2020Logic locking (LL) is used to protect designs from various security vulnerabilities in the Integrated Circuits (IC) supply chain. Development of a satisfiability checking (SAT) attack in 2015, which breaks all the existing LL techniques at that time, divides the LL defenses into two classes: pre-SAT and post-SAT.
Melbin John +3 more
openaire +1 more source
An Efficient SAT-Attack Algorithm Against Logic Encryption
2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), 2019This paper presents a novel efficient SAT-attack algorithm for logic encryption. The existing SAT-attack algorithm can decrypt almost all encrypted circuits proposed so far, however, there are cases that it takes a huge amount of CPU time. This is because the number of clauses being added during the decryption increases drastically in that case.
Yusuke Matsunaga, Masayoshi Yoshimura
openaire +1 more source
A SAT Attack on Higher Dimensional Erdős–Szekeres Numbers
2021A famous result by Erdős and Szekeres (1935) asserts that, for all $k,d \in \mathbb{N}$, there is a smallest integer $n = g^{(d)}(k)$ such that every set of at least $n$ points in $\mathbb{R}^d$ in general position contains a $k$-gon, that is, a subset of $k$ points which is in convex position.
openaire +1 more source
SAT-based bit-flipping attack on logic encryptions
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018Logic encryption is a hardware security technique that uses extra key inputs to prevent unauthorized use of a circuit. With the discovery of the SAT-based attack, new encryption techniques such as SARLock and Anti-SAT are proposed, and further combined with traditional logic encryption techniques, to guarantee both high error rates and resilience to ...
Yuanqi Shen, Amin Rezaei, Hai Zhou
openaire +1 more source
Strategies on Algebraic Attacks Using SAT Solvers
2008 The 9th International Conference for Young Computer Scientists, 2008SAT solvers are employed in algebraic attacks to stream ciphers in recent years. This attack describes a cipher by a Boolean equation system in the initial state, and then converts the equation system into a SAT instance. After that, attackers use SAT solvers to solve the instance, and thus recover the initial state.
openaire +1 more source
Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared
2010The SMS4 block cipher is part of the Chinese WAPI wireless standard. This paper describes the specification and offers a specification for a toy version called simplified SMS4 (S-SMS4). We explore algebraic attacks on SMS4 and S-SMS4 using Grobner basis attacks on equation systems over GF(2) and GF(28), as well as attacks using a SAT solver derived ...
Jeremy Erickson +2 more
openaire +1 more source

