UNTANGLE: Unlocking Routing and Logic Obfuscation Using Graph Neural Networks-based Link Prediction
暂无分享,去创建一个
Muhammad Abdullah Hanif | Ozgur Sinanoglu | Lilas Alrahis | Satwik Patnaik | Muhammad Shafique | O. Sinanoglu | Satwik Patnaik | M. Shafique | Lilas Alrahis
[1] Ozgur Sinanoglu,et al. Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd) – Unlocked , 2019, IEEE Transactions on Information Forensics and Security.
[2] Swarup Bhunia,et al. SCOPE: Synthesis-Based Constant Propagation Attack on Logic Locking , 2021, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[3] Faiq Khalid,et al. GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking , 2020, 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[4] Ramesh Karri,et al. A Primer on Hardware Security: Models, Methods, and Metrics , 2014, Proceedings of the IEEE.
[5] Jarrod A. Roy,et al. Ending Piracy of Integrated Circuits , 2010, Computer.
[6] Mustafa Coskun,et al. Drug Response Prediction as a Link Prediction Problem , 2017, Scientific Reports.
[7] Meng Li,et al. AppSAT: Approximately deobfuscating integrated circuits , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[8] Ziv Bar-Joseph,et al. Evaluation of different biological data and computational classification methods for use in protein interaction prediction , 2006, Proteins.
[9] Pinchen Cui,et al. TGA: An Oracle-less and Topology-Guided Attack on Logic Locking , 2019, ASHES@CCS.
[10] Rohit Kapur,et al. Encrypt Flip-Flop: A Novel Logic Encryption Technique For Sequential Circuits , 2018, ArXiv.
[11] Jeyavijayan Rajendran,et al. Provably-Secure Logic Locking: From Theory To Practice , 2017, CCS.
[12] Swarup Bhunia,et al. Sweep to the Secret: A Constant Propagation Attack on Logic Locking , 2019, 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).
[13] Donglin Su,et al. Secure Scan and Test Using Obfuscation Throughout Supply Chain , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[14] Jeyavijayan Rajendran,et al. Removal Attacks on Logic Locking and Camouflaging Techniques , 2020, IEEE Transactions on Emerging Topics in Computing.
[15] Houman Homayoun,et al. InterLock: An Intercorrelated Logic and Routing Locking , 2020, 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD).
[16] Hai Zhou,et al. CycSAT: SAT-based attack on cyclic logic encryptions , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[17] Sayak Ray,et al. Evaluating the security of logic encryption algorithms , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[18] Ozgur Sinanoglu,et al. SARLock: SAT attack resistant logic locking , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[19] Ankur Srivastava,et al. Mitigating SAT Attack on Logic Locking , 2016, CHES.
[20] Meng Li,et al. Cyclic Obfuscation for Creating SAT-Unresolvable Circuits , 2017, ACM Great Lakes Symposium on VLSI.
[21] Jeyavijayan Rajendran,et al. Fault Analysis-Based Logic Encryption , 2015, IEEE Transactions on Computers.
[22] Robert K. Brayton,et al. ABC: An Academic Industrial-Strength Verification Tool , 2010, CAV.
[23] Ankur Srivastava,et al. Delay locking: Security enhancement of logic locking against IC counterfeiting and overproduction , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).
[24] Ozgur Sinanoglu,et al. DynUnlock: Unlocking Scan Chains Obfuscated using Dynamic Keys , 2020, 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[25] Houman Homayoun,et al. NNgSAT: Neural Network guided SAT Attack on Logic Locked Complex Structures , 2020, 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD).
[26] Deepak Sirone,et al. Functional Analysis Attacks on Logic Locking , 2018, IEEE Transactions on Information Forensics and Security.
[27] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[28] Lada A. Adamic,et al. Friends and neighbors on the Web , 2003, Soc. Networks.
[29] Yixin Chen,et al. An End-to-End Deep Learning Architecture for Graph Classification , 2018, AAAI.
[30] Rainer Leupers,et al. Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach , 2020, ArXiv.
[31] Alex Orailoglu,et al. Piercing Logic Locking Keys through Redundancy Identification , 2019, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[32] Ozgur Sinanoglu,et al. UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking , 2020, IEEE Transactions on Information Forensics and Security.
[33] Jon M. Kleinberg,et al. The link-prediction problem for social networks , 2007, J. Assoc. Inf. Sci. Technol..
[34] Baker Mohammad,et al. Functional Reverse Engineering on SAT-Attack Resilient Logic Locking , 2019, 2019 IEEE International Symposium on Circuits and Systems (ISCAS).
[35] Ozgur Sinanoglu,et al. ScanSAT: unlocking obfuscated scan chains , 2019, ASP-DAC.
[36] Susmita Sur-Kolay,et al. SoC: A Real Platform for IP Reuse, IP Infringement, and IP Protection , 2011, VLSI Design.
[37] Yixin Chen,et al. Link Prediction Based on Graph Neural Networks , 2018, NeurIPS.
[38] Avesta Sasan,et al. Full-Lock: Hard Distributions of SAT instances for Obfuscating Circuits using Fully Configurable Logic and Routing Blocks , 2019, 2019 56th ACM/IEEE Design Automation Conference (DAC).
[39] Swarup Bhunia,et al. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation , 2018, 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).
[40] Lawrence Pileggi,et al. Modeling Techniques for Logic Locking , 2020, 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD).
[41] Ozgur Sinanoglu,et al. ScanSAT: Unlocking Static and Dynamic Scan Obfuscation , 2019, IEEE Transactions on Emerging Topics in Computing.
[42] Avesta Sasan,et al. SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..