Advances in logic locking: Past, present, and prospects

HM Kamali, KZ Azar, F Farahmandi… - Cryptology ePrint …, 2022 - eprint.iacr.org
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …

IP protection and supply chain security through logic obfuscation: A systematic overview

K Shamsi, M Li, K Plaks, S Fazzari, DZ Pan… - ACM Transactions on …, 2019 - dl.acm.org
The globalization of the semiconductor supply chain introduces ever-increasing security and
privacy risks. Two major concerns are IP theft through reverse engineering and malicious …

Provably-secure logic locking: From theory to practice

M Yasin, A Sengupta, MT Nabeel, M Ashraf… - Proceedings of the …, 2017 - dl.acm.org
Logic locking has been conceived as a promising proactive defense strategy against
intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and …

AppSAT: Approximately deobfuscating integrated circuits

K Shamsi, M Li, T Meade, Z Zhao… - … on Hardware Oriented …, 2017 - ieeexplore.ieee.org
In today's diversified semiconductor supply-chain, protecting intellectual property (IP) and
maintaining manufacturing integrity are important concerns. Circuit obfuscation techniques …

Removal attacks on logic locking and camouflaging techniques

M Yasin, B Mazumdar, O Sinanoglu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the adoption of a globalized and distributed IC design flow, IP piracy, reverse
engineering, and counterfeiting threats are becoming more prevalent. Logic obfuscation …

Anti-SAT: Mitigating SAT attack on logic locking

Y Xie, A Srivastava - … on Computer-Aided Design of Integrated …, 2018 - ieeexplore.ieee.org
Logic locking is a technique that is proposed to protect outsourced IC designs from piracy
and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality …

SMT attack: Next generation attack on obfuscated circuits with capabilities and performance beyond the SAT attacks

KZ Azar, HM Kamali, H Homayoun… - IACR Transactions on …, 2019 - tches.iacr.org
In this paper, we introduce the Satisfiability Modulo Theory (SMT) attack on obfuscated
circuits. The proposed attack is the superset of Satisfiability (SAT) attack, with many …

SAIL: Machine learning guided structural analysis attack on hardware obfuscation

P Chakraborty, J Cruz, S Bhunia - 2018 Asian Hardware …, 2018 - ieeexplore.ieee.org
Obfuscation is a technique for protecting hardware intellectual property (IP) blocks against
reverse engineering, piracy, and malicious modifications. Current obfuscation efforts mainly …

Cyclic obfuscation for creating SAT-unresolvable circuits

K Shamsi, M Li, T Meade, Z Zhao, DZ Pan… - Proceedings of the Great …, 2017 - dl.acm.org
Logic locking and IC camouflaging are proactive circuit obfuscation methods that if proven
secure can thwart hardware attacks such as reverse engineering and IP theft. However, the …

CycSAT: SAT-based attack on cyclic logic encryptions

H Zhou, R Jiang, S Kong - 2017 IEEE/ACM International …, 2017 - ieeexplore.ieee.org
Cyclic logic encryption is a newly proposed circuit obfuscation technique in hardware
security. It was claimed to be SAT-unresolvable because feedback cycles were intentionally …