CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme
暂无分享,去创建一个
Domenic Forte | Xiaolin Xu | Bicky Shakya | Mark Tehranipoor | M. Tehranipoor | Domenic Forte | Bicky Shakya | Xiaolin Xu
[1] Jeyavijayan Rajendran,et al. Security analysis of Anti-SAT , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[2] Dick James,et al. The State-of-the-Art in IC Reverse Engineering , 2009, CHES.
[3] Avesta Sasan,et al. Full-Lock: Hard Distributions of SAT instances for Obfuscating Circuits using Fully Configurable Logic and Routing Blocks , 2019, 2019 56th ACM/IEEE Design Automation Conference (DAC).
[4] Jeyavijayan Rajendran,et al. Removal Attacks on Logic Locking and Camouflaging Techniques , 2020, IEEE Transactions on Emerging Topics in Computing.
[5] Sayak Ray,et al. Evaluating the security of logic encryption algorithms , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[6] Rohit Kapur,et al. Encrypt Flip-Flop: A Novel Logic Encryption Technique For Sequential Circuits , 2018, ArXiv.
[7] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[8] Ozgur Sinanoglu,et al. ATPG-based cost-effective, secure logic locking , 2018, 2018 IEEE 36th VLSI Test Symposium (VTS).
[9] Giovanni De Micheli,et al. The EPFL Combinational Benchmark Suite , 2015 .
[10] Ujjwal Guin,et al. Counterfeit Integrated Circuits , 2015 .
[11] Paul D. Franzon,et al. FreePDK: An Open-Source Variation-Aware Design Kit , 2007, 2007 IEEE International Conference on Microelectronic Systems Education (MSE'07).
[12] Deepak Sirone,et al. Functional Analysis Attacks on Logic Locking , 2018, IEEE Transactions on Information Forensics and Security.
[13] Igor L. Markov,et al. Solving the Third-Shift Problem in IC Piracy With Test-Aware Logic Locking , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[14] Ankur Srivastava,et al. Mitigating SAT Attack on Logic Locking , 2016, CHES.
[15] Meng Li,et al. Provably Secure Camouflaging Strategy for IC Protection , 2019, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[16] Nilanjan Mukherjee,et al. Hardware Protection via Logic Locking Test Points , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[17] Jeyavijayan Rajendran,et al. Security analysis of integrated circuit camouflaging , 2013, CCS.
[18] Marc Thurley,et al. sharpSAT - Counting Models with Advanced Component Caching and Implicit BCP , 2006, SAT.
[19] Jeyavijayan Rajendran,et al. Provably-Secure Logic Locking: From Theory To Practice , 2017, CCS.
[20] Christian J. Muise,et al. Dsharp: Fast d-DNNF Compilation with sharpSAT , 2012, Canadian Conference on AI.
[21] Jeyavijayan Rajendran,et al. Fault Analysis-Based Logic Encryption , 2015, IEEE Transactions on Computers.
[22] Meng Li,et al. AppSAT: Approximately deobfuscating integrated circuits , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[23] Ankur Srivastava,et al. Anti-SAT: Mitigating SAT Attack on Logic Locking , 2019, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[24] Ramesh Karri,et al. On Improving the Security of Logic Locking , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[25] Ozgur Sinanoglu,et al. SARLock: SAT attack resistant logic locking , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[26] Farinaz Koushanfar,et al. Active Hardware Metering for Intellectual Property Protection and Security , 2007, USENIX Security Symposium.
[27] Navid Asadizanjani,et al. Chip editor: Leveraging circuit edit for logic obfuscation and trusted fabrication , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[28] Mark Mohammad Tehranipoor,et al. Covert Gates: Protecting Integrated Circuits with Undetectable Camouflaging , 2019, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[29] S. Yang,et al. Logic Synthesis and Optimization Benchmarks User Guide Version 3.0 , 1991 .
[30] Domenic Forte,et al. Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks , 2017, CHES.