Defense-in-depth: A recipe for logic locking to prevail

MT Rahman, MS Rahman, H Wang, S Tajik, W Khalil… - Integration, 2020 - Elsevier
Logic locking/obfuscation has emerged as an auspicious solution for protecting the
semiconductor intellectual property (IP) from the untrusted entities in the design and …

Full-lock: Hard distributions of sat instances for obfuscating circuits using fully configurable logic and routing blocks

HM Kamali, KZ Azar, H Homayoun… - Proceedings of the 56th …, 2019 - dl.acm.org
In this paper, we propose a novel and SAT-resistant logic-locking technique, denoted as Full-
Lock, to obfuscate and protect the hardware against threats including IP-piracy and reverse …

InterLock: An intercorrelated logic and routing locking

HM Kamali, KZ Azar, H Homayoun… - Proceedings of the 39th …, 2020 - dl.acm.org
In this paper, we propose a canonical prune-and-SAT (CP&SAT) attack for breaking state-of-
the-art routing-based obfuscation techniques. In the CP&SAT attack, we first encode the key …

Challenging the security of logic locking schemes in the era of deep learning: A neuroevolutionary approach

D Sisejkovic, F Merchant, LM Reimann… - ACM Journal on …, 2021 - dl.acm.org
Logic locking is a prominent technique to protect the integrity of hardware designs
throughout the integrated circuit design and fabrication flow. However, in recent years, the …

NNgSAT: Neural network guided SAT attack on logic locked complex structures

KZ Azar, HM Kamali, H Homayoun… - Proceedings of the 39th …, 2020 - dl.acm.org
The globalization of the IC supply chain has raised many security threats, especially when
untrusted parties are involved. This has created a demand for a dependable logic …

Deceptive logic locking for hardware integrity protection against machine learning attacks

D Sisejkovic, F Merchant, LM Reimann… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Logic locking has emerged as a prominent key-driven technique to protect the integrity of
integrated circuits. However, novel machine-learning-based attacks have recently been …

RANE: An open-source formal de-obfuscation attack for reverse engineering of logic encrypted circuits

S Roshanisefat, H Mardani Kamali… - Proceedings of the …, 2021 - dl.acm.org
To enable trust in the IC supply chain, logic locking as an IP protection technique received
significant attention in recent years. Over the years, by utilizing Boolean satisfiability (SAT) …

An Overview of FPGA-inspired Obfuscation Techniques

ZU Abideen, S Gokulanathan, M J. Aljafar… - ACM Computing …, 2024 - dl.acm.org
Building and maintaining a silicon foundry is a costly endeavor that requires substantial
financial investment. From this scenario, the semiconductor business has largely shifted to a …

From cryptography to logic locking: A survey on the architecture evolution of secure scan chains

KZ Azar, HM Kamali, H Homayoun, A Sasan - IEEE Access, 2021 - ieeexplore.ieee.org
The availability of access to Integrated Circuits' scan chain is an inevitable requirement of
modern ICs for testability/debugging purposes. However, leaving access to the scan chain …

Security and complexity analysis of LUT-based obfuscation: From blueprint to reality

G Kolhe, HM Kamali, M Naicker… - 2019 IEEE/ACM …, 2019 - ieeexplore.ieee.org
Recent obfuscation schemes have leveraged reconfigurable logics to alleviate various
hardware security threats. However, existing reconfigurable logic-based obfuscation …