Provably secure camouflaging strategy for IC protection
暂无分享,去创建一个
Meng Li | David Z. Pan | Yier Jin | Zheng Zhao | Kaveh Shamsi | Travis Meade | Bei Yu | Meng Li | Bei Yu | D. Pan | Zheng Zhao | Yier Jin | Kaveh Shamsi | Travis Meade
[1] Robert K. Brayton,et al. Using SAT for combinational equivalence checking , 2001, Proceedings Design, Automation and Test in Europe. Conference and Exhibition 2001.
[2] Ankur Srivastava,et al. Mitigating SAT Attack on Logic Locking , 2016, CHES.
[3] Meng Li,et al. AppSAT: Approximately deobfuscating integrated circuits , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[4] Christof Paar,et al. Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques , 2019, IEEE Transactions on Information Forensics and Security.
[5] Meng Li,et al. Cyclic Obfuscation for Creating SAT-Unresolvable Circuits , 2017, ACM Great Lakes Symposium on VLSI.
[6] David Bryan,et al. Combinational profiles of sequential benchmark circuits , 1989, IEEE International Symposium on Circuits and Systems,.
[7] David Z. Pan,et al. Revisit sequential logic obfuscation: Attacks and defenses , 2017, 2017 IEEE International Symposium on Circuits and Systems (ISCAS).
[8] Sayak Ray,et al. Evaluating the security of logic encryption algorithms , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[9] Houman Homayoun,et al. Hybrid STT-CMOS designs for reverse-engineering prevention , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[10] Jeyavijayan Rajendran,et al. VLSI testing based security metric for IC camouflaging , 2013, 2013 IEEE International Test Conference (ITC).
[11] Siddharth Garg,et al. Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse Engineering Attacks , 2016, 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
[12] Sue Kinn,et al. Introduction to the hardware , 1998 .
[13] Christof Paar,et al. Development of a Layout-Level Hardware Obfuscation Tool , 2015, 2015 IEEE Computer Society Annual Symposium on VLSI.
[14] Evgueni A. Haroutunian,et al. Information Theory and Statistics , 2011, International Encyclopedia of Statistical Science.
[15] Dick James,et al. The state-of-the-art in semiconductor reverse engineering , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).
[16] Xiangyu Zhang,et al. Incremental SAT-Based Reverse Engineering of Camouflaged Logic Circuits , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[17] Ken Mai,et al. A secure camouflaged threshold voltage defined logic family , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[18] Jeyavijayan Rajendran,et al. Security analysis of integrated circuit camouflaging , 2013, CCS.
[19] Steve Hanneke,et al. A bound on the label complexity of agnostic active learning , 2007, ICML '07.
[20] Nur A. Touba,et al. Improving logic obfuscation via logic cone analysis , 2015, 2015 16th Latin-American Test Symposium (LATS).
[21] Xiangyu Zhang,et al. Oracle-guided incremental SAT solving to reverse engineer camouflaged logic circuits , 2016, 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[22] Ozgur Sinanoglu,et al. SARLock: SAT attack resistant logic locking , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[23] John Langford,et al. Tutorial summary: Active learning , 2009, ICML '09.
[24] S. Yang,et al. Logic Synthesis and Optimization Benchmarks User Guide Version 3.0 , 1991 .
[25] Moshe Y. Vardi,et al. Intelligate: An Algorithm for Learning Boolean Functions for Dynamic Power Reduction , 2009, J. Low Power Electron..
[26] David A. Cohn,et al. Improving generalization with active learning , 1994, Machine Learning.
[27] Yier Jin,et al. Introduction to Hardware Security , 2015, Electronics.
[28] Jeyavijayan Rajendran,et al. Security analysis of Anti-SAT , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[29] Yu (Kevin) Cao,et al. What is Predictive Technology Model (PTM)? , 2009, SIGD.
[30] Michael T. Niemier,et al. Using emerging technologies for hardware security beyond PUFs , 2016, 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[31] Jeyavijayan Rajendran,et al. CamoPerturb: Secure IC camouflaging for minterm protection , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[32] Mark Mohammad Tehranipoor,et al. A Survey on Chip to System Reverse Engineering , 2016, JETC.
[33] Ashish Tiwari,et al. Reverse Engineering Digital Circuits Using Structural and Functional Analyses , 2014, IEEE Transactions on Emerging Topics in Computing.
[34] Siddharth Garg,et al. Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes , 2015, NDSS.
[35] Ronald P. Cocchi,et al. Circuit camouflage integration for hardware IP protection , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[36] Harvey M. Deitel,et al. Introduction to Hardware , 1985 .
[37] Meng Li,et al. Circuit Obfuscation and Oracle-guided Attacks: Who can Prevail? , 2017, ACM Great Lakes Symposium on VLSI.
[38] Christof Paar,et al. Stealthy dopant-level hardware Trojans: extended version , 2014, Journal of Cryptographic Engineering.
[39] Swaroop Ghosh,et al. Threshold Voltage-Defined Switches for Programmable Gates , 2015, ArXiv.