Development and Evaluation of Hardware Obfuscation Benchmarks
暂无分享,去创建一个
Mark Mohammad Tehranipoor | Swarup Bhunia | Domenic Forte | Xiaolin Xu | Yier Jin | Bicky Shakya | Sarah Amir | M. Tehranipoor | S. Bhunia | Domenic Forte | Yier Jin | Bicky Shakya | Xiaolin Xu | Sarah Amir
[1] Navid Asadizanjani,et al. Chip editor: Leveraging circuit edit for logic obfuscation and trusted fabrication , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[2] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[3] Ankur Srivastava,et al. Mitigating SAT Attack on Logic Locking , 2016, CHES.
[4] M. Ciesielski,et al. BDS: a BDD-based logic optimization system , 2000, Proceedings 37th Design Automation Conference.
[5] Siddharth Garg,et al. Logic Locking for Secure Outsourced Chip Fabrication: A New Attack and Provably Secure Defense Mechanism , 2017, ArXiv.
[6] Mark Mohammad Tehranipoor,et al. CSST: An Efficient Secure Split-Test for Preventing IC Piracy , 2014, 2014 IEEE 23rd North Atlantic Test Workshop.
[7] Mark Mohammad Tehranipoor,et al. Comparative Analysis of Hardware Obfuscation for IP Protection , 2017, ACM Great Lakes Symposium on VLSI.
[8] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[9] Farinaz Koushanfar,et al. Active Hardware Metering for Intellectual Property Protection and Security , 2007, USENIX Security Symposium.
[10] Jarrod A. Roy,et al. EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.
[11] Miodrag Potkonjak,et al. Remote activation of ICs for piracy prevention and digital right management , 2007, 2007 IEEE/ACM International Conference on Computer-Aided Design.
[12] Ramesh Karri,et al. On Improving the Security of Logic Locking , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[13] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[14] Jeyavijayan Rajendran,et al. Security analysis of Anti-SAT , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[15] Domenic Forte,et al. Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks , 2017, CHES.
[16] Hai Zhou,et al. Double DIP: Re-Evaluating Security of Logic Encryption Algorithms , 2017, ACM Great Lakes Symposium on VLSI.
[17] Jarrod A. Roy,et al. Ending Piracy of Integrated Circuits , 2010, Computer.
[18] Jeyavijayan Rajendran,et al. Logic encryption: A fault analysis perspective , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[19] Ozgur Sinanoglu,et al. SARLock: SAT attack resistant logic locking , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[20] Giovanni Squillero,et al. RT-Level ITC'99 Benchmarks and First ATPG Results , 2000, IEEE Des. Test Comput..
[21] Tsutomu Sasao,et al. Logic Synthesis and Verification , 2013 .
[22] Siddharth Garg,et al. Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation , 2013, USENIX Security Symposium.
[23] Swarup Bhunia,et al. Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation , 2011, J. Electron. Test..
[24] Jonathan Rose,et al. Characterization and parameterized random generation of digital circuits , 1996, DAC '96.
[25] David Bryan,et al. Combinational profiles of sequential benchmark circuits , 1989, IEEE International Symposium on Circuits and Systems,.
[26] Jeyavijayan Rajendran,et al. Hardware security: Threat models and metrics , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[27] Miodrag Potkonjak,et al. Watermarking techniques for intellectual property protection , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[28] Jeyavijayan Rajendran,et al. Is split manufacturing secure? , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[29] Swarup Bhunia,et al. Security and Trust Vulnerabilities in Third-Party IPs , 2017 .
[30] Swarup Bhunia,et al. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation , 2017 .
[31] Enrico Macii,et al. Exact computation of the entropy of a logic circuit , 1996, Proceedings of the Sixth Great Lakes Symposium on VLSI.
[32] Michael Chen,et al. A Platform Solution for Secure Supply-Chain and Chip Life-Cycle Management , 2016, Computer.
[33] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[34] Miodrag Potkonjak,et al. CAD-based Security, Cryptography, and Digital Rights Management , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[35] Meng Li,et al. AppSAT: Approximately deobfuscating integrated circuits , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[36] Rajat Subhra Chakraborty,et al. Hardware IP Protection During Evaluation Using Embedded Sequential Trojan , 2012, IEEE Design & Test of Computers.
[37] Jeyavijayan Rajendran,et al. Belling the CAD: Toward Security-Centric Electronic System Design , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[38] Swarup Bhunia,et al. Hardware protection and authentication through netlist level obfuscation , 2008, ICCAD 2008.
[39] Mark Mohammad Tehranipoor,et al. Security vulnerability analysis of design-for-test exploits for asset protection in SoCs , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[40] F. Brglez,et al. A neutral netlist of 10 combinational benchmark circuits and a target translator in FORTRAN , 1985 .
[41] Swarup Bhunia,et al. Security against hardware Trojan through a novel application of design obfuscation , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.
[42] Swarup Bhunia,et al. RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation , 2010, 2010 23rd International Conference on VLSI Design.
[43] Sayak Ray,et al. Evaluating the security of logic encryption algorithms , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[44] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .