3.8 Proceedings Paper

Thwarting Reverse Engineering Attacks through Keyless Logic Obfuscation

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Hardware & Architecture

Fun-SAT: Functional Corruptibility-Guided SAT-Based Attack on Sequential Logic Encryption

Yinghua Hu et al.

Summary: The SAT attack has proven to be effective against most combinational logic encryption methods and can be extended to attack sequential logic encryption techniques. However, without guidance on the number of circuit unrollings needed, the attack may solve many SAT and model checking problems inefficiently. Fun-SAT introduces functional corruptibility guidance to decrease SAT solving and model checking time, achieving significant speedup compared to previous attacks against state-of-the-art encryption methods.

2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST) (2021)

Proceedings Paper Computer Science, Hardware & Architecture

JavaSMT 3: Interacting with SMT Solvers in Java

Daniel Baier et al.

Summary: SMT technology has many applications, but different solvers have different APIs, making it difficult to switch between them. JAVASMT is a unified API framework that supports multiple SMT solvers.

COMPUTER AIDED VERIFICATION, PT II, CAV 2021 (2021)

Proceedings Paper Computer Science, Hardware & Architecture

The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes

M. Tanjidur Rahman et al.

PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST) (2020)

Proceedings Paper Automation & Control Systems

Piercing Logic Locking Keys through Redundancy Identification

Leon Li et al.

2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE) (2019)

Proceedings Paper Computer Science, Hardware & Architecture

TGA: An Oracle-less and Topology-Guided Attack on Logic Locking

Yuqiao Zhang et al.

PROCEEDINGS OF THE 3RD ACM WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY WORKSHOP (ASHES '19) (2019)

Proceedings Paper Computer Science, Hardware & Architecture

AVFSM: A Framework for Identifying and Mitigating Vulnerabilities in FSMs

Adib Nahiyan et al.

2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2016)

Article Computer Science, Hardware & Architecture

Designing Trusted Embedded Systems from Finite State Machines

Carson Dunbar et al.

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS (2014)

Article Computer Science, Theory & Methods

Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management

Farinaz Koushanfar

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)