Results 21 to 30 of about 401,263 (277)

How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems [PDF]

open access: yes, 2015
Recently security researchers have started to look into automated generation of attack trees from socio-technical system models. The obvious next step in this trend of automated risk analysis is automating the selection of security controls to treat the ...
Gadyatskaya, Olga
core   +4 more sources

RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation on SPN block ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Algebraic Fault Analysis (AFA) is a cryptanalysis for block ciphers proposed by Courtois et al., which incorporates algebraic cryptanalysis to overcome the complexity of manual analysis within the context of Differential Fault Analysis (DFA).
Zehong (Zephyr) Qiu, Fan Zhang
doaj   +1 more source

Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation

open access: yesCryptography, 2022
Logic locking is a technique that can help hinder reverse-engineering-based attacks in the IC supply chain from untrusted foundries or end-users. In 2015, the Boolean Satisfiability (SAT) attack was introduced.
Guangwei Zhao, Kaveh Shamsi
doaj   +1 more source

Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Deep neural networks (DNN) have become a significant threat to the security of cryptographic implementations with regards to side-channel analysis (SCA), as they automatically combine the leakages without any preprocessing needed, leading to a more ...
Trevor Yap   +3 more
doaj   +1 more source

Noise‐based logic locking scheme against signal probability skew analysis

open access: yesIET Computers & Digital Techniques, 2021
Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats.
Ahmad Rezaei, Ali Mahani
doaj   +1 more source

A SAT attack on the Erdős–Szekeres conjecture

open access: yesElectronic Notes in Discrete Mathematics, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Balko, Martin, Valtr, Pavel
openaire   +1 more source

Deep Graph Learning for Circuit Deobfuscation

open access: yesFrontiers in Big Data, 2021
Circuit obfuscation is a recently proposed defense mechanism to protect the intellectual property (IP) of digital integrated circuits (ICs) from reverse engineering.
Zhiqian Chen   +8 more
doaj   +1 more source

Hybrid Shielding: Amplifying the Power of Camouflaging and Logic Encryption

open access: yesIEEE Access, 2023
In the semiconductor industry, protecting Integrated Circuits (IC) throughout the IC supply chain has become a major concern. In-depth research has been done on logic encryption, split manufacturing, and layout camouflaging to safeguard ICs against ...
Nikhil Saxena, Ranga Vemuri
doaj   +1 more source

A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Locking-based intellectual property (IP) protection for integrated circuits (ICs) being manufactured at untrusted facilities has been largely defeated by the satisfiability (SAT) attack, which can retrieve the secret key needed for instantiating ...
Aric Fowler   +6 more
doaj   +1 more source

Advancing Hardware Security Using Polymorphic and Stochastic Spin-Hall Effect Devices

open access: yes, 2018
Protecting intellectual property (IP) in electronic circuits has become a serious challenge in recent years. Logic locking/encryption and layout camouflaging are two prominent techniques for IP protection.
amarù   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy