Articles with "logic locking" as a keyword



Photo by arielbesagar from unsplash

Robust Logic locking for Securing Reusable DSP Cores

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2936401

Abstract: A System on Chip (SoC) used in Consumer Electronics (CE) systems integrates a number of reusable Intellectual Property (IP) cores from digital signal processing (DSP), multimedia etc. However, these DSP based IP cores are susceptible… read more here.

Keywords: securing reusable; dsp; locking securing; logic locking ... See more keywords
Photo from wikipedia

Logic Locking Using Emerging 2T/3T Magnetic Tunnel Junctions for Hardware Security

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3208650

Abstract: With the advancement of beyond CMOS devices, a new approach to utilize the inherent physics of such emerging structures for various applications is of great interest in recent research. Spintronics-based devices offer key advantages like… read more here.

Keywords: magnetic tunnel; logic locking; tunnel junctions; hardware security ... See more keywords
Photo from wikipedia

Trace Logic Locking: Improving the Parametric Space of Logic Locking

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2020.3025135

Abstract: To protect against an untrusted foundry, logic locking must 1) inject sufficient error to ensure critical application failures for any wrong key (error severity) and 2) resist any attack against it (attack resilient). We begin… read more here.

Keywords: attack; logic locking; parametric space; trace logic ... See more keywords
Photo by wugod1852 from unsplash

Thwarting All Logic Locking Attacks: Dishonest Oracle With Truly Random Logic Locking

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2020.3029133

Abstract: While logic locking is a promising defense to protect hardware designs, many attacks have been shown to undermine its security by retrieving the secret key. All the powerful attacks rely on a working chip, i.e.,… read more here.

Keywords: truly random; logic locking; defense; random logic ... See more keywords
Photo by arielbesagar from unsplash

LOOPLock 2.0: An Enhanced Cyclic Logic Locking Approach

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2021.3053912

Abstract: LOOPLock is the state-of-the-art cyclic logic locking method in hardware security. LOOPLock is able to invalidate SAT Attack, Removal Attack, and CycSAT simultaneously by introducing two types of cycle pairs in a circuit. In this… read more here.

Keywords: approach looplock; logic locking; looplock; cyclic logic ... See more keywords
Photo from wikipedia

A Scan Obfuscation Guided Design-for-Security Approach for Sequential Circuits

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Circuits and Systems II: Express Briefs"

DOI: 10.1109/tcsii.2019.2915606

Abstract: Logic locking, a popular countermeasure against IP piracy and counterfeiting, has been a target of several attacks, especially Boolean satisfiability attacks. The state-of-the-art solutions against SAT attack struggle to meet a fundamental criterion of logic… read more here.

Keywords: sequential circuits; guided design; logic locking; obfuscation guided ... See more keywords

GNNUnlock+: A Systematic Methodology for Designing Graph Neural Networks-Based Oracle-Less Unlocking Schemes for Provably Secure Logic Locking

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Emerging Topics in Computing"

DOI: 10.1109/tetc.2021.3108487

Abstract: Leading-edge design houses outsource the fabrication process to pure-play foundries eliminating the expenses of owning and maintaining a fab. The intellectual property (IP) of an outsourced design is now subject to IP piracy, which drives… read more here.

Keywords: mml mml; mml; methodology; gnnunlock ... See more keywords
Photo from wikipedia

Functional Analysis Attacks on Logic Locking

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2020.2968183

Abstract: Logic locking refers to a set of techniques that can protect integrated circuits (ICs) from counterfeiting, piracy and malicious functionality changes by an untrusted foundry. It achieves these goals by introducing new inputs, called key… read more here.

Keywords: analysis attacks; key inputs; logic locking; functional analysis ... See more keywords
Photo from wikipedia

Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3149147

Abstract: Protection of the design intellectual property (IP) has become a pertinent need owing to the globalized integrated circuit (IC) supply chain. Logic locking has been perceived as a holistic solution ensuring protection against multiple supply… read more here.

Keywords: tool; provably secure; locking techniques; security ... See more keywords