Benchmarking the Capabilities and Limitations of SAT Solvers in Defeating Obfuscation Schemes
暂无分享,去创建一个
[1] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[2] Ozgur Sinanoglu,et al. SARLock: SAT attack resistant logic locking , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[3] Niklas Sörensson,et al. An Extensible SAT-solver , 2003, SAT.
[4] Ronald P. Cocchi,et al. Circuit camouflage integration for hardware IP protection , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[5] Mark Mohammad Tehranipoor,et al. Anti-counterfeit Techniques: From Design to Resign , 2013, 2013 14th International Workshop on Microprocessor Test and Verification.
[6] Jiliang Zhang,et al. A Practical Logic Obfuscation Technique for Hardware Security , 2016, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[7] Jeyavijayan Rajendran,et al. Security analysis of Anti-SAT , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[8] Gilles Audemard. Glucose and Syrup in the SAT Race 2015 , 2015 .
[9] Giorgio Di Natale,et al. A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans , 2014, 2014 IEEE 20th International On-Line Testing Symposium (IOLTS).
[10] Sayak Ray,et al. Evaluating the security of logic encryption algorithms , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[11] Siddharth Garg,et al. Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes , 2015, NDSS.
[12] Krzysztof Czarnecki,et al. Learning Rate Based Branching Heuristic for SAT Solvers , 2016, SAT.
[13] Avesta Sasan,et al. LUT-Lock: A Novel LUT-Based Logic Obfuscation for FPGA-Bitstream and ASIC-Hardware Protection , 2018, 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
[14] Marijn J. H. Heule,et al. Proceedings of SAT Competition 2017: Solver and Benchmark Descriptions , 2017 .
[15] Meng Li,et al. Provably secure camouflaging strategy for IC protection , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[16] Jeyavijayan Rajendran,et al. Fault Analysis-Based Logic Encryption , 2015, IEEE Transactions on Computers.
[17] Jarrod A. Roy,et al. Ending Piracy of Integrated Circuits , 2010, Computer.
[18] Avesta Sasan,et al. SRCLock: SAT-Resistant Cyclic Logic Locking for Protecting the Hardware , 2018, ACM Great Lakes Symposium on VLSI.
[19] Ankur Srivastava,et al. Mitigating SAT Attack on Logic Locking , 2016, CHES.
[20] Sarma B. K. Vrudhula,et al. Digital IP protection using threshold voltage control , 2016, 2016 17th International Symposium on Quality Electronic Design (ISQED).
[21] Armin Biere. Lingeling, Plingeling and Treengeling Entering the SAT Competition 2013 , 2013 .