Advances in logic locking: Past, present, and prospects

HM Kamali, KZ Azar, F Farahmandi… - Cryptology ePrint …, 2022 - eprint.iacr.org
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …

An overview of FPGA-inspired obfuscation techniques

ZU Abideen, S Gokulanathan, M J. Aljafar… - ACM Computing …, 2024 - dl.acm.org
Building and maintaining a silicon foundry is a costly endeavor that requires substantial
financial investment. From this scenario, the semiconductor business has largely shifted to a …

UNTANGLE: Unlocking routing and logic obfuscation using graph neural networks-based link prediction

L Alrahis, S Patnaik, MA Hanif… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Logic locking aims to prevent intellectual property (IP) piracy and unauthorized
overproduction of integrated circuits (ICs). However, initial logic locking techniques were …

MuxLink: Circumventing learning-resilient mux-locking using graph neural network-based link prediction

L Alrahis, S Patnaik, M Shafique… - … Design, Automation & …, 2022 - ieeexplore.ieee.org
Logic locking has received considerable interest as a prominent technique for protecting the
design intellectual property from untrusted entities, especially the foundry. Recently …

Graph neural networks: A powerful and versatile tool for advancing design, reliability, and security of ICs

L Alrahis, J Knechtel, O Sinanoglu - Proceedings of the 28th Asia and …, 2023 - dl.acm.org
Graph neural networks (GNNs) have pushed the state-of-the-art (SOTA) for performance in
learning and predicting on large-scale data present in social networks, biology, etc. Since …

Logic locking for IP security: A comprehensive analysis on challenges, techniques, and trends

J Gandhi, D Shekhawat, M Santosh, JG Pandey - Computers & Security, 2023 - Elsevier
A substantial part of the Integrated Circuit (IC) supply chain that involves semiconductor
fabrication, packaging, and testing has shifted globally to minimize IC costs and satisfy …

Titan: Security analysis of large-scale hardware obfuscation using graph neural networks

L Mankali, L Alrahis, S Patnaik… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Hardware obfuscation is a prominent design-for-trust solution that thwarts intellectual
property (IP) piracy and reverse-engineering of integrated circuits (ICs). Researchers have …

Embracing graph neural networks for hardware security

L Alrahis, S Patnaik, M Shafique… - Proceedings of the 41st …, 2022 - dl.acm.org
Graph neural networks (GNNs) have attracted increasing attention due to their superior
performance in deep learning on graph-structured data. GNNs have succeeded across …

Security closure of IC layouts against hardware Trojans

F Wang, Q Wang, B Fu, S Jiang, X Zhang… - Proceedings of the …, 2023 - dl.acm.org
Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced
nowadays. However, passing ICs through various third-party providers gives rise to many …

Redundancy attack: Breaking logic locking through oracleless rationality analysis

L Li, A Orailoglu - … Transactions on Computer-Aided Design of …, 2022 - ieeexplore.ieee.org
During the last decade, logic locking has been proposed to protect integrated circuits
against piracy and reverse engineering threats. Functional pruning attacks, such as the …