Results 21 to 30 of about 400,990 (266)

Noise‐based logic locking scheme against signal probability skew analysis

open access: yesIET Computers & Digital Techniques, 2021
Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats.
Ahmad Rezaei, Ali Mahani
doaj   +1 more source

Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation

open access: yesCryptography, 2022
Logic locking is a technique that can help hinder reverse-engineering-based attacks in the IC supply chain from untrusted foundries or end-users. In 2015, the Boolean Satisfiability (SAT) attack was introduced.
Guangwei Zhao, Kaveh Shamsi
doaj   +1 more source

Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Deep neural networks (DNN) have become a significant threat to the security of cryptographic implementations with regards to side-channel analysis (SCA), as they automatically combine the leakages without any preprocessing needed, leading to a more ...
Trevor Yap   +3 more
doaj   +1 more source

How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems [PDF]

open access: yes, 2015
Recently security researchers have started to look into automated generation of attack trees from socio-technical system models. The obvious next step in this trend of automated risk analysis is automating the selection of security controls to treat the ...
Gadyatskaya, Olga
core   +4 more sources

A SAT attack on the Erdős–Szekeres conjecture

open access: yesElectronic Notes in Discrete Mathematics, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Balko, Martin, Valtr, Pavel
openaire   +1 more source

Deep Graph Learning for Circuit Deobfuscation

open access: yesFrontiers in Big Data, 2021
Circuit obfuscation is a recently proposed defense mechanism to protect the intellectual property (IP) of digital integrated circuits (ICs) from reverse engineering.
Zhiqian Chen   +8 more
doaj   +1 more source

Hybrid Shielding: Amplifying the Power of Camouflaging and Logic Encryption

open access: yesIEEE Access, 2023
In the semiconductor industry, protecting Integrated Circuits (IC) throughout the IC supply chain has become a major concern. In-depth research has been done on logic encryption, split manufacturing, and layout camouflaging to safeguard ICs against ...
Nikhil Saxena, Ranga Vemuri
doaj   +1 more source

A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Locking-based intellectual property (IP) protection for integrated circuits (ICs) being manufactured at untrusted facilities has been largely defeated by the satisfiability (SAT) attack, which can retrieve the secret key needed for instantiating ...
Aric Fowler   +6 more
doaj   +1 more source

Integrated cost-benefit analysis of tsetse control and herd productivity to inform control programs for animal African trypanosomiasis [PDF]

open access: yes, 2018
Animal African trypanosomiasis (AAT) and its tsetse vector are responsible for annual losses estimated in billions of US dollars ($). Recent years have seen the implementation of a series of multinational interventions.
Chilongo, K   +7 more
core   +1 more source

SAT-based lazy formal analysis method for security protocols

open access: yesTongxin xuebao, 2014
A SAT-based security protocol formalization analysis method named SAT-LMC is proposed.The method introduces optimized the initial state and transformational rules with “lazy” idea.The efficiency of detection is significantly improved.Moreover,by adding ...
Chun-xiang GU   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy