Advances in logic locking: Past, present, and prospects

HM Kamali, KZ Azar, F Farahmandi… - Cryptology ePrint …, 2022 - eprint.iacr.org
Logic locking is a design concealment mechanism for protecting the IPs integrated into
modern System-on-Chip (SoC) architectures from a wide range of hardware security threats …

An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Provably-secure logic locking: From theory to practice

M Yasin, A Sengupta, MT Nabeel, M Ashraf… - Proceedings of the …, 2017 - dl.acm.org
Logic locking has been conceived as a promising proactive defense strategy against
intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and …

Hardware trojans: Lessons learned after one decade of research

K Xiao, D Forte, Y Jin, R Karri, S Bhunia… - ACM Transactions on …, 2016 - dl.acm.org
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …

Evaluating the security of logic encryption algorithms

P Subramanyan, S Ray, S Malik - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Contemporary integrated circuits are designed and manufactured in a globalized
environment leading to concerns of piracy, overproduction and counterfeiting. One class of …

SARLock: SAT attack resistant logic locking

M Yasin, B Mazumdar, JJV Rajendran… - … Oriented Security and …, 2016 - ieeexplore.ieee.org
Logic locking is an Intellectual Property (IP) protection technique that thwarts IP piracy,
hardware Trojans, reverse engineering, and IC overproduction. Researchers have taken …

A primer on hardware security: Models, methods, and metrics

M Rostami, F Koushanfar, R Karri - Proceedings of the IEEE, 2014 - ieeexplore.ieee.org
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …

AppSAT: Approximately deobfuscating integrated circuits

K Shamsi, M Li, T Meade, Z Zhao… - … on Hardware Oriented …, 2017 - ieeexplore.ieee.org
In today's diversified semiconductor supply-chain, protecting intellectual property (IP) and
maintaining manufacturing integrity are important concerns. Circuit obfuscation techniques …

Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain

U Guin, K Huang, D DiMase, JM Carulli… - Proceedings of the …, 2014 - ieeexplore.ieee.org
As the electronic component supply chain grows more complex due to globalization, with
parts coming from a diverse set of suppliers, counterfeit electronics have become a major …

On improving the security of logic locking

M Yasin, JJV Rajendran, O Sinanoglu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Due to globalization of integrated circuit (IC) design flow, rogue elements in the supply chain
can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by …