[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shen et al., 2018 - Google Patents

A comparative investigation of approximate attacks on logic encryptions

Shen et al., 2018

View PDF
Document ID
14162227331527589987
Author
Shen Y
Rezaei A
Zhou H
Publication year
Publication venue
2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC)

External Links

Snippet

Logic encryption is an important hardware protection technique that adds extra keys to lock a given circuit. With recent discovery of the effective SAT-based attack, new enhancement methods such as SARLock and Anti-SAT have been proposed to thwart the SAT-based and …
Continue reading at par.nsf.gov (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot

Similar Documents

Publication Publication Date Title
Sirone et al. Functional analysis attacks on logic locking
Sengupta et al. Truly stripping functionality for logic locking: A fault-based perspective
Shen et al. A comparative investigation of approximate attacks on logic encryptions
Chakraborty et al. Keynote: A disquisition on logic locking
Yang et al. Stripped functionality logic locking with hamming distance-based restore unit (SFLL-hd)–unlocked
Xie et al. Anti-SAT: Mitigating SAT attack on logic locking
Yasin et al. Trustworthy hardware design: Combinational logic locking techniques
Yasin et al. Evolution of logic locking
Dupuis et al. Logic locking: A survey of proposed methods and evaluation metrics
Rostami et al. A primer on hardware security: Models, methods, and metrics
Da Rolt et al. Test versus security: Past and present
Koteshwara et al. Key-based dynamic functional obfuscation of integrated circuits using sequentially triggered mode-based design
Shen et al. SAT-based bit-flipping attack on logic encryptions
Rahman et al. Security assessment of dynamically obfuscated scan chain against oracle-guided attacks
Engels et al. The end of logic locking? A critical view on the security of logic locking
Zhou A humble theory and application for logic encryption
Karmakar et al. Efficient key-gate placement and dynamic scan obfuscation towards robust logic encryption
Kasarabada et al. On SAT-based attacks on encrypted sequential logic circuits
Duvalsaint et al. Characterization of locked combinational circuits via ATPG
Alrahis et al. Functional reverse engineering on SAT-attack resilient logic locking
Zhang et al. An on-chip dynamically obfuscated wrapper for protecting supply chain against IP and IC piracies
El Massad et al. The SAT attack on IC camouflaging: Impact and potential countermeasures
Alaql et al. SARO: Scalable attack-resistant logic locking
Zhou et al. Vulnerability and remedy of stripped function logic locking
Rathor et al. Gatelock: Input-dependent key-based locked gates for sat resistant logic locking