Defense-in-depth: A recipe for logic locking to prevail

MT Rahman, MS Rahman, H Wang, S Tajik, W Khalil… - Integration, 2020 - Elsevier
Logic locking/obfuscation has emerged as an auspicious solution for protecting the
semiconductor intellectual property (IP) from the untrusted entities in the design and …

Keynote: A disquisition on logic locking

A Chakraborty, NG Jayasankaran, Y Liu… - … on Computer-Aided …, 2019 - ieeexplore.ieee.org
The fabless business model has given rise to many security threats, including piracy of
intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and …

Attacks on cryptosystems implemented via VLSI: A review

MM Sravani, SA Durai - Journal of Information Security and Applications, 2021 - Elsevier
Serious threats to the VLSI crypto devices are posed by the Side Channel Attack (SCA) that
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …

Strong anti-SAT: Secure and effective logic locking

Y Liu, M Zuzak, Y Xie, A Chakraborty… - … on Quality Electronic …, 2020 - ieeexplore.ieee.org
Logic locking has been proposed as strong protection of intellectual property (IP) against
security threats in the IC supply chain especially when the fabrication facility is untrusted …

Physical attack protection techniques for IC chip level hardware security

M Nagata, T Miki, N Miura - IEEE transactions on very large …, 2021 - ieeexplore.ieee.org
Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC)
chips in a practical utilization environment. This article provides overviews of physical …

Security closure of physical layouts ICCAD special session paper

J Knechtel, J Gopinath, J Bhandari… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Computer-aided design (CAD) tools traditionally optimize for power, performance, and area
(PPA). However, given a vast number of hardware security threats, we call for secure-by …

Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices

N Rangarajan, S Patnaik, J Knechtel… - … on Emerging Topics …, 2020 - ieeexplore.ieee.org
The era of widespread globalization has led to the emergence of hardware-centric security
threats throughout the IC supply chain. Prior defenses like logic locking, layout …

Robust and attack resilient logic locking with a high application-level impact

Y Liu, M Zuzak, Y Xie, A Chakraborty… - ACM Journal on …, 2021 - dl.acm.org
Logic locking is a hardware security technique aimed at protecting intellectual property
against security threats in the IC supply chain, especially those posed by untrusted …

Si-backside protection circuits against physical security attacks on flip-chip devices

T Miki, M Nagata, H Sonoda, N Miura… - IEEE Journal of Solid …, 2020 - ieeexplore.ieee.org
This article presents a cryptographic key protection technique from physical security attacks
through Si-backside of IC chip. Flip-chip packaging leads to a serious security hole that …

RNN-based detection of fault attacks on RSA

TÇ Köylü, CRW Reinbrecht… - … on Circuits and …, 2020 - ieeexplore.ieee.org
Physical fault injection attacks are becoming an important threat to computer systems, as
fault injection equipment becomes more and more accessible. In this work, we propose a …