A Module-Level Configuration Methodology for Programmable Camouflaged Logic

J Wang, Z Chen, J Zhang, Y Xu, T Yu, Z Zheng… - ACM Transactions on …, 2024 - dl.acm.org
Logic camouflage is a widely adopted technique that mitigates the threat of intellectual
property (IP) piracy and overproduction in the integrated circuit (IC) supply chain …

TroScan: Enhancing on-chip delivery resilience to physical attack through frequency-triggered key generation

J Wang, S Deng, H Yang… - … Design, Automation & …, 2024 - ieeexplore.ieee.org
Keys grant access to devices and are the core secrets in logic obfuscation. Typically, keys
are stored in tamper-proof memory and are subsequently delivered to logic locking modules …