Shen et al., 2018 - Google Patents
A comparative investigation of approximate attacks on logic encryptionsShen et al., 2018
View PDF- Document ID
- 14162227331527589987
- Author
- Shen Y
- Rezaei A
- Zhou H
- Publication year
- Publication venue
- 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC)
External Links
Snippet
Logic encryption is an important hardware protection technique that adds extra keys to lock a given circuit. With recent discovery of the effective SAT-based attack, new enhancement methods such as SARLock and Anti-SAT have been proposed to thwart the SAT-based and …
- 230000000052 comparative effect 0 title abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sirone et al. | Functional analysis attacks on logic locking | |
Sengupta et al. | Truly stripping functionality for logic locking: A fault-based perspective | |
Shen et al. | A comparative investigation of approximate attacks on logic encryptions | |
Chakraborty et al. | Keynote: A disquisition on logic locking | |
Yang et al. | Stripped functionality logic locking with hamming distance-based restore unit (SFLL-hd)–unlocked | |
Xie et al. | Anti-SAT: Mitigating SAT attack on logic locking | |
Yasin et al. | Trustworthy hardware design: Combinational logic locking techniques | |
Yasin et al. | Evolution of logic locking | |
Dupuis et al. | Logic locking: A survey of proposed methods and evaluation metrics | |
Rostami et al. | A primer on hardware security: Models, methods, and metrics | |
Da Rolt et al. | Test versus security: Past and present | |
Koteshwara et al. | Key-based dynamic functional obfuscation of integrated circuits using sequentially triggered mode-based design | |
Shen et al. | SAT-based bit-flipping attack on logic encryptions | |
Rahman et al. | Security assessment of dynamically obfuscated scan chain against oracle-guided attacks | |
Engels et al. | The end of logic locking? A critical view on the security of logic locking | |
Zhou | A humble theory and application for logic encryption | |
Karmakar et al. | Efficient key-gate placement and dynamic scan obfuscation towards robust logic encryption | |
Kasarabada et al. | On SAT-based attacks on encrypted sequential logic circuits | |
Duvalsaint et al. | Characterization of locked combinational circuits via ATPG | |
Alrahis et al. | Functional reverse engineering on SAT-attack resilient logic locking | |
Zhang et al. | An on-chip dynamically obfuscated wrapper for protecting supply chain against IP and IC piracies | |
El Massad et al. | The SAT attack on IC camouflaging: Impact and potential countermeasures | |
Alaql et al. | SARO: Scalable attack-resistant logic locking | |
Zhou et al. | Vulnerability and remedy of stripped function logic locking | |
Rathor et al. | Gatelock: Input-dependent key-based locked gates for sat resistant logic locking |