Keynote: A disquisition on logic locking

A Chakraborty, NG Jayasankaran, Y Liu… - … on Computer-Aided …, 2019 - ieeexplore.ieee.org
The fabless business model has given rise to many security threats, including piracy of
intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and …

SAT-hard cyclic logic obfuscation for protecting the IP in the manufacturing supply chain

S Roshanisefat, HM Kamali… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
State-of-the-art attacks against cyclic logic obfuscation use satisfiability solvers that are
equipped with a set of cycle-avoidance clauses. These cycle-avoidance clauses are …

Efficient key-gate placement and dynamic scan obfuscation towards robust logic encryption

R Karmakar, H Kumar… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Logic encryption has emerged to be a potential solution to the problem of Intellectual
Property (IP)-Piracy and counterfeiting. However, in the recent past, several attacks have …

On SAT-based attacks on encrypted sequential logic circuits

Y Kasarabada, S Chen, R Vemuri - … Symposium on Quality …, 2019 - ieeexplore.ieee.org
Logic encryption has emerged as a solution to the hardware intellectual property (IP)
protection prob-lem. In recent years, many attack methods have been proposed to counter …

Tunable FPGA bitstream obfuscation with boolean satisfiability attack countermeasure

B Olney, R Karam - ACM Transactions on Design Automation of …, 2020 - dl.acm.org
Field Programmable Gate Arrays (FPGAs) are seeing a surge in usage in many emerging
application domains, where the in-field reconfigurability is an attractive characteristic for …

The SAT attack on IC camouflaging: Impact and potential countermeasures

M El Massad, S Garg… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Integrated circuit (IC) camouflaging is a promising defense against so-called IC extraction
attacks that seek to reverse engineer the netlist of a packaged IC using delayering and …

Analysis of the satisfiability attack against logic encryption using synthetic benchmarks

JK Meka, S Venkatesh, R Vemuri - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The logic encryption methodology to hardware security introduces key inputs and key gates
such that the circuit functionality is obfuscated unless the correct key is applied. The …

Hardening circuit-design ip against reverse-engineering attacks

A Chhotaray, T Shrimpton - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
Design-hiding techniques are a central piece of academic and industrial efforts to protect
electronic circuits from being reverse-engineered. However, these techniques have lacked a …

LOOPLock 3.0: A Robust Cyclic Logic Locking Approach

PP Chen, XM Yang, YC He, YC Chen… - 2024 29th Asia and …, 2024 - ieeexplore.ieee.org
Cyclic logic locking is a cutting-edge hardware security method developed to defend against
SAT Attack. It introduces cycles into the original circuit, which can cause the circuit to either …

Improving security of logic encryption in presence of design-for-testability infrastructure

R Karmakar, S Chattopadhyay… - … Symposium on Circuits …, 2019 - ieeexplore.ieee.org
Logic Encryption has emerged to be a promising solution to the ever-increasing problem of
IP piracy and counterfeiting. The state-of-the-art logic encryption techniques fail to offer …