Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives

UJ Botero, R Wilson, H Lu, MT Rahman… - ACM Journal on …, 2021 - dl.acm.org
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …

Provably-secure logic locking: From theory to practice

M Yasin, A Sengupta, MT Nabeel, M Ashraf… - Proceedings of the …, 2017 - dl.acm.org
Logic locking has been conceived as a promising proactive defense strategy against
intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and …

Removal attacks on logic locking and camouflaging techniques

M Yasin, B Mazumdar, O Sinanoglu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the adoption of a globalized and distributed IC design flow, IP piracy, reverse
engineering, and counterfeiting threats are becoming more prevalent. Logic obfuscation …

Cyclic obfuscation for creating SAT-unresolvable circuits

K Shamsi, M Li, T Meade, Z Zhao, DZ Pan… - Proceedings of the Great …, 2017 - dl.acm.org
Logic locking and IC camouflaging are proactive circuit obfuscation methods that if proven
secure can thwart hardware attacks such as reverse engineering and IP theft. However, the …

Provably secure camouflaging strategy for IC protection

M Li, K Shamsi, T Meade, Z Zhao, B Yu… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
The advancing of reverse engineering techniques has complicated the efforts in intellectual
property protection. Proactive methods have been developed recently, among which layout …

IP protection and supply chain security through logic obfuscation: A systematic overview

K Shamsi, M Li, K Plaks, S Fazzari, DZ Pan… - ACM Transactions on …, 2019 - dl.acm.org
The globalization of the semiconductor supply chain introduces ever-increasing security and
privacy risks. Two major concerns are IP theft through reverse engineering and malicious …

Hardware and information security primitives based on 2D materials and devices

A Wali, S Das - Advanced Materials, 2023 - Wiley Online Library
Hardware security is a major concern for the entire semiconductor ecosystem that accounts
for billions of dollars in annual losses. Similarly, information security is a critical need for the …

Defense-in-depth: A recipe for logic locking to prevail

MT Rahman, MS Rahman, H Wang, S Tajik, W Khalil… - Integration, 2020 - Elsevier
Logic locking/obfuscation has emerged as an auspicious solution for protecting the
semiconductor intellectual property (IP) from the untrusted entities in the design and …

Hardware reverse engineering: Overview and open challenges

M Fyrbiak, S Strauß, C Kison, S Wallat… - 2017 IEEE 2nd …, 2017 - ieeexplore.ieee.org
Hardware reverse engineering is a universal tool for both legitimate and illegitimate
purposes. On the one hand, it supports confirmation of IP infringement and detection of …