High-level approaches to hardware security: A tutorial

H Pearce, R Karri, B Tan - ACM Transactions on Embedded Computing …, 2023 - dl.acm.org
Designers use third-party intellectual property (IP) cores and outsource various steps in the
integrated circuit (IC) design and manufacturing flow. As a result, security vulnerabilities …

IP Security in Structured ASIC: Challenges and Prospects

R Almawzan, S Paria, A Dasgupta… - 2024 IEEE Computer …, 2024 - ieeexplore.ieee.org
With the globalization of hardware man-ufacturing and the growing demand for electronics,
companies now heavily rely on offshore facilities for most of the design and manufacturing …

A ph sensing system with security enhanced cryptographic system

M Farhan, AY Rahman… - 2023 IEEE 66th …, 2023 - ieeexplore.ieee.org
Integrated compact sensor systems are essential in many applications. However, the design
focus is on sensor performance metrics and encryption of the wireless signals is usually an …

Security Evaluation of State Space Obfuscation of Hardware IP through a Red Team-Blue Team Practice

MM Rahman, J Geist, D Xing, Y Liu… - ACM Transactions on …, 2024 - dl.acm.org
Due to the inclination towards a fab-less model of integrated circuit (IC) manufacturing,
several untrusted entities get white-box access to the proprietary intellectual property (IP) …

Hardware Honeypot: Setting Sequential Reverse Engineering on a Wrong Track

M Brunner, HH Lee, A Hepp, J Baehr… - 2024 27th International …, 2024 - ieeexplore.ieee.org
Reverse engineering (RE) of finite state machines (FSMs) is a serious threat when
protecting designs against RE attacks. While most recent protection techniques rely on the …

Library-Attack: Reverse Engineering Approach for Evaluating Hardware IP Protection

A Dasgupta, S Paria, C Sozio, A Lukefahr… - arXiv preprint arXiv …, 2025 - arxiv.org
Existing countermeasures for hardware IP protection, such as obfuscation, camouflaging,
and redaction, aim to defend against confidentiality and integrity attacks. However, within the …

LISA: A Multi-Layered Iterative Framework for Hardening Obfuscation with Modular Unit Transformations

R Almawzan, A Chatterjee, A Dasgupta… - Proceedings of the Great …, 2024 - dl.acm.org
Securing intellectual property (IP) in hardware has become increasingly crucial amid
increasing threats from adversaries due to untrusted entities in the integrated circuit (IC) …

Splitting the Secrets: A Cooperative Trust Model for System-on-Chip Designs with Untrusted IPs

A Dasgupta, S Paria, P Chakraborty… - 2024 IEEE Computer …, 2024 - ieeexplore.ieee.org
Securing System-on-Chips (SoCs) is challenging due to the globally distributed supply
chain involving untrusted entities and integrating multiple third-party hardware intellectual …

Trimming The Fat: A Minimum-Security Architecture for Protecting SoC Designs Against Supply Chain Threats

K Raj, A Bhattacharyay, S Bhunia… - 2024 25th International …, 2024 - ieeexplore.ieee.org
Supply chain security is an interesting facet of modern System-on-chip security. While other
attacks (control flow, information flow, side-channel, etc.) may be of interest in specific …

United We Protect: Protecting IP Confidentiality with Integrated Transformation and Redaction

MM Rahman, R Almawzan, A Dasgupta… - 2024 IEEE Physical …, 2024 - ieeexplore.ieee.org
Due to the globally distributed nature of the semiconductor industry, hardware intellectual
property (IP) blocks are increasingly subject to attacks on their confidentiality, including IP …