Results 251 to 260 of about 400,990 (266)
Some of the next articles are maybe not open access.
The SAT Attack on IC Camouflaging: Impact and Potential Countermeasures
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020Integrated circuit (IC) camouflaging is a promising defense against so-called IC extraction attacks that seek to reverse engineer the netlist of a packaged IC using delayering and imaging techniques. Camouflaging works by hiding the Boolean functionality of selected gates in the netlist from reverse engineering, albeit at the cost of increased gate ...
Mohamed El Massad +2 more
openaire +1 more source
Tree-Based Logic Encryption for Resisting SAT Attack
2017 IEEE 26th Asian Test Symposium (ATS), 2017Logic encryption is an IC protection technique which inserts key gates or logic blocks controlled by key inputs to hide a circuit's functionality. An encrypted circuit needs to be activated with a secret key for being functional. Recently, a powerful attack method based on SAT solving was proposed.
openaire +1 more source
Functional Reverse Engineering on SAT-Attack Resilient Logic Locking
2019 IEEE International Symposium on Circuits and Systems (ISCAS), 2019Logic locking is a solution that mitigates hardware security threats, such as Trojan insertion, piracy and counterfeiting. Research in this area has led to, in an iterative fashion, a series of logic locking defenses as well as attacks that circumvent these defenses by extracting the logic locking key. The most powerful attacks rely on a full access to
Lilas Alrahis +4 more
openaire +1 more source
IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits
2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2019“Cyclic” circuit locking/camouflaging is a recently proposed direction in logic obfuscation for thwarting foundry and end-user reverse engineering. As opposed to traditional schemes, these techniques create cycles in the obfuscated circuit in a way that confuses the attacker but does not disrupt the combinational nature of the circuit.
Kaveh Shamsi, David Z. Pan, Yier Jin
openaire +1 more source
On SAT-Based Attacks On Encrypted Sequential Logic Circuits
20th International Symposium on Quality Electronic Design (ISQED), 2019Logic encryption has emerged as a solution to the hardware intellectual property (IP) protection prob-lem. In recent years, many attack methods have been proposed to counter the protection offered by logic encryption. Most state-of-the-art logic encryption schemes have been shown to be susceptible to one or more of these attack methods.
Yasaswy Kasarabada +2 more
openaire +1 more source
Inversion Attacks on Secure Hash Functions Using sat Solvers
2007Inverting a function f at a given point y in its range involves finding any x in the domain such that f(x) = y. This is a general problem. We wish to find a heuristic for inverting those functions which satisfy certain statistical properties similar to those of random functions.
Debapratim De +2 more
openaire +1 more source
A combined attack on RSA algorithm by SAT-approach
2016 Dynamics of Systems, Mechanisms and Machines (Dynamics), 2016The article deals with factoring cryptanalysis that can be used in attack on popular encryption and digital signing algorithm RSA. Factoring reduces to SAT problem, and one's solution is unique and corresponds to multiplier's bit. A method of simple iteration is applied to SAT, also three polynomial heuristics are applied with the goal to improve ...
openaire +1 more source
SMARTLock: SAT Attack and Removal Attack-Resistant Tree-Based Logic Locking
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020openaire +1 more source
CycSAT: SAT-based attack on cyclic logic encryptions
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2017Hai Zhou, Ruifeng Jiang, Shuyu Kong
openaire +1 more source
Expanding In-Cone Obfuscated Tree for Anti SAT Attack
2023 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2023RuiJie Wang +3 more
openaire +1 more source

