Logic locking: A survey of proposed methods and evaluation metrics

S Dupuis, ML Flottes - Journal of Electronic Testing, 2019 - Springer
The outsourcing business model is dominating the semiconductor industry. Due to this loss
of control over the design flow, several threats have become a major source of concern …

Deep RNN-oriented paradigm shift through BOCANet: Broken obfuscated circuit attack

F Tehranipoor, N Karimian… - Proceedings of the …, 2019 - dl.acm.org
Logic encryption obfuscation has been used for thwarting counterfeiting, overproduction,
and reverse engineering but vulnerable to attacks. However, it was recently shown that …

Tunable FPGA bitstream obfuscation with boolean satisfiability attack countermeasure

B Olney, R Karam - ACM Transactions on Design Automation of …, 2020 - dl.acm.org
Field Programmable Gate Arrays (FPGAs) are seeing a surge in usage in many emerging
application domains, where the in-field reconfigurability is an attractive characteristic for …

Defeating data plane attacks with program obfuscation

C Black, S Scott-Hayward - IEEE Transactions on Dependable …, 2023 - ieeexplore.ieee.org
Data plane switches in software-defined networks are increasingly recognised as potential
targets for attack, with recent exploits showing their vulnerability to full compromise. The …

Machine learning aided key-guessing attack paradigm against logic block encryption

Y Zhong, JH Feng, XX Cui, XL Cui - Journal of Computer Science and …, 2021 - Springer
Hardware security remains as a major concern in the circuit design ow. Logic block based
encryption has been widely adopted as a simple but effective protection method. In this …

[图书][B] Secure Reconfigurable Computing Paradigms for the Next Generation of Artificial Intelligence and Machine Learning Applications

B Olney - 2023 - search.proquest.com
The fields of artificial intelligence (AI) and machine learning (ML) have been popular tools
for data analysis at the edge, particularly through complex deep and convolutional neural …

Smartlock: Sat attack and removal attack-resistant tree-based logic locking

YC Chen - IEICE Transactions on Fundamentals of Electronics …, 2020 - search.ieice.org
Logic encryption is an IC protection technique which inserts extra logic and key inputs to
hide a circuit's functionality. An encrypted circuit needs to be activated with a secret key for …

[PDF][PDF] Mitigating data plane device compromise in programmable networks

C Black - 2023 - pure.qub.ac.uk
Society's reliance on computer networks has grown rapidly in recent decades, with the
number of interconnected devices projected to hit 29.3 billion in 2023 [3]. This explosion in …

Efficient Logic Encryption Techniques for Sequential Circuits

YV Kasarabada - 2020 - search.proquest.com
Logic encryption, a prominent solution to the hardware IP security problem, protects a circuit
by adding'encryption'logic to lock the design functionality using a set of newly introduced key …