Results 21 to 30 of about 400,990 (266)
Noise‐based logic locking scheme against signal probability skew analysis
Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats.
Ahmad Rezaei, Ali Mahani
doaj +1 more source
Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation
Logic locking is a technique that can help hinder reverse-engineering-based attacks in the IC supply chain from untrusted foundries or end-users. In 2015, the Boolean Satisfiability (SAT) attack was introduced.
Guangwei Zhao, Kaveh Shamsi
doaj +1 more source
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis
Deep neural networks (DNN) have become a significant threat to the security of cryptographic implementations with regards to side-channel analysis (SCA), as they automatically combine the leakages without any preprocessing needed, leading to a more ...
Trevor Yap +3 more
doaj +1 more source
How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems [PDF]
Recently security researchers have started to look into automated generation of attack trees from socio-technical system models. The obvious next step in this trend of automated risk analysis is automating the selection of security controls to treat the ...
Gadyatskaya, Olga
core +4 more sources
A SAT attack on the Erdős–Szekeres conjecture
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Balko, Martin, Valtr, Pavel
openaire +1 more source
Deep Graph Learning for Circuit Deobfuscation
Circuit obfuscation is a recently proposed defense mechanism to protect the intellectual property (IP) of digital integrated circuits (ICs) from reverse engineering.
Zhiqian Chen +8 more
doaj +1 more source
Hybrid Shielding: Amplifying the Power of Camouflaging and Logic Encryption
In the semiconductor industry, protecting Integrated Circuits (IC) throughout the IC supply chain has become a major concern. In-depth research has been done on logic encryption, split manufacturing, and layout camouflaging to safeguard ICs against ...
Nikhil Saxena, Ranga Vemuri
doaj +1 more source
Locking-based intellectual property (IP) protection for integrated circuits (ICs) being manufactured at untrusted facilities has been largely defeated by the satisfiability (SAT) attack, which can retrieve the secret key needed for instantiating ...
Aric Fowler +6 more
doaj +1 more source
Integrated cost-benefit analysis of tsetse control and herd productivity to inform control programs for animal African trypanosomiasis [PDF]
Animal African trypanosomiasis (AAT) and its tsetse vector are responsible for annual losses estimated in billions of US dollars ($). Recent years have seen the implementation of a series of multinational interventions.
Chilongo, K +7 more
core +1 more source
SAT-based lazy formal analysis method for security protocols
A SAT-based security protocol formalization analysis method named SAT-LMC is proposed.The method introduces optimized the initial state and transformational rules with “lazy” idea.The efficiency of detection is significantly improved.Moreover,by adding ...
Chun-xiang GU +4 more
doaj +2 more sources

