In this paper, we propose a novel and SAT-resistant logic-locking technique, denoted as Full- Lock, to obfuscate and protect the hardware against threats including IP-piracy and reverse …
In this paper, we propose a canonical prune-and-SAT (CP&SAT) attack for breaking state-of- the-art routing-based obfuscation techniques. In the CP&SAT attack, we first encode the key …
Logic locking is a prominent technique to protect the integrity of hardware designs throughout the integrated circuit design and fabrication flow. However, in recent years, the …
The globalization of the IC supply chain has raised many security threats, especially when untrusted parties are involved. This has created a demand for a dependable logic …
Logic locking has emerged as a prominent key-driven technique to protect the integrity of integrated circuits. However, novel machine-learning-based attacks have recently been …
To enable trust in the IC supply chain, logic locking as an IP protection technique received significant attention in recent years. Over the years, by utilizing Boolean satisfiability (SAT) …
Building and maintaining a silicon foundry is a costly endeavor that requires substantial financial investment. From this scenario, the semiconductor business has largely shifted to a …
The availability of access to Integrated Circuits' scan chain is an inevitable requirement of modern ICs for testability/debugging purposes. However, leaving access to the scan chain …
G Kolhe, HM Kamali, M Naicker… - 2019 IEEE/ACM …, 2019 - ieeexplore.ieee.org
Recent obfuscation schemes have leveraged reconfigurable logics to alleviate various hardware security threats. However, existing reconfigurable logic-based obfuscation …