Breaking the Design and Security Trade-off of Look-up-table–based Obfuscation
暂无分享,去创建一个
H. Mahmoodi | S. Rafatirad | H. Homayoun | Avesta Sasan | Gaurav Kolhe | T. Sheaves | S. D
[1] Sai Manoj Pudukotai Dinakarrao,et al. A Neural Network-Based Cognitive Obfuscation Toward Enhanced Logic Locking , 2022, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[2] Sanket Shukla,et al. On-device Malware Detection using Performance-Aware and Robust Collaborative Learning , 2021, 2021 58th ACM/IEEE Design Automation Conference (DAC).
[3] Houman Homayoun,et al. Securing Hardware via Dynamic Obfuscation Utilizing Reconfigurable Interconnect and Logic Blocks , 2021, 2021 58th ACM/IEEE Design Automation Conference (DAC).
[4] Houman Homayoun,et al. InterLock: An Intercorrelated Logic and Routing Locking , 2020, 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD).
[5] Houman Homayoun,et al. SATConda: SAT to SAT-Hard Clause Translator , 2020, 2020 21st International Symposium on Quality Electronic Design (ISQED).
[6] Sanket Shukla,et al. RNN-Based Classifier to Detect Stealthy Malware using Localized Features and Complex Symbolic Sequence , 2019, 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA).
[7] Avesta Sasan,et al. Security and Complexity Analysis of LUT-based Obfuscation: From Blueprint to Reality , 2019, 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[8] Sanket Shukla,et al. Stealthy Malware Detection using RNN-Based Automated Localized Feature Extraction and Classifier , 2019, 2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI).
[9] Gaurav Kolhe,et al. MicroArchitectural events and image processing-based hybrid approach for robust malware detection: work-in-progress , 2019, Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion - CASES '19.
[10] Peter A. Beerel,et al. System-Level Framework for Logic Obfuscation with Quantified Metrics for Evaluation , 2019, 2019 IEEE Cybersecurity Development (SecDev).
[11] Ozgur Sinanoglu,et al. Is Robust Design-for-Security Robust Enough? Attack on Locked Circuits with Restricted Scan Chain Access , 2019, 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[12] Avesta Sasan,et al. On Custom LUT-based Obfuscation , 2019, ACM Great Lakes Symposium on VLSI.
[13] Deepak Sirone,et al. Functional Analysis Attacks on Logic Locking , 2018, IEEE Transactions on Information Forensics and Security.
[14] Houman Homayoun,et al. Estimating the Circuit De-obfuscation Runtime based on Graph Deep Learning , 2019, 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[15] Ankur Srivastava,et al. Anti-SAT: Mitigating SAT Attack on Logic Locking , 2019, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[16] Ramesh Karri,et al. Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices , 2018, IEEE Transactions on Emerging Topics in Computing.
[17] Avesta Sasan,et al. SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[18] Hamid Mahmoodi,et al. Static Design of Spin Transfer Torques Magnetic Look Up Tables for ASIC Designs , 2018, ACM Great Lakes Symposium on VLSI.
[19] Avesta Sasan,et al. LUT-Lock: A Novel LUT-Based Logic Obfuscation for FPGA-Bitstream and ASIC-Hardware Protection , 2018, 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
[20] Avesta Sasan,et al. SRCLock: SAT-Resistant Cyclic Logic Locking for Protecting the Hardware , 2018, ACM Great Lakes Symposium on VLSI.
[21] Hai Zhou,et al. Cyclic locking and memristor-based obfuscation against CycSAT and inside foundry attacks , 2018, 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[22] Ozgur Sinanoglu,et al. Advancing hardware security using polymorphic and stochastic spin-hall effect devices , 2018, 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[23] Yiran Chen,et al. Exploiting Spin-Orbit Torque Devices As Reconfigurable Logic for Circuit Obfuscation , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[24] Jeyavijayan Rajendran,et al. Provably-Secure Logic Locking: From Theory To Practice , 2017, CCS.
[25] Jeyavijayan Rajendran,et al. Testing the Trustworthiness of IC Testing: An Oracle-Less Attack on IC Camouflaging , 2017, IEEE Transactions on Information Forensics and Security.
[26] Meng Li,et al. Cyclic Obfuscation for Creating SAT-Unresolvable Circuits , 2017, ACM Great Lakes Symposium on VLSI.
[27] Meng Li,et al. AppSAT: Approximately deobfuscating integrated circuits , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[28] Jeyavijayan Rajendran,et al. CamoPerturb: Secure IC camouflaging for minterm protection , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[29] Michael Chen,et al. A Platform Solution for Secure Supply-Chain and Chip Life-Cycle Management , 2016, Computer.
[30] Houman Homayoun,et al. Hybrid STT-CMOS designs for reverse-engineering prevention , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[31] K. Xiao,et al. Hardware Trojans , 2016, ACM Trans. Design Autom. Electr. Syst..
[32] Ozgur Sinanoglu,et al. SARLock: SAT attack resistant logic locking , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[33] Sayak Ray,et al. Evaluating the security of logic encryption algorithms , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[34] Jeyavijayan Rajendran,et al. Fault Analysis-Based Logic Encryption , 2015, IEEE Transactions on Computers.
[35] Ramesh Karri,et al. A Primer on Hardware Security: Models, Methods, and Metrics , 2014, Proceedings of the IEEE.
[36] Brandon Wang,et al. Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[37] Jeyavijayan Rajendran,et al. Security analysis of integrated circuit camouflaging , 2013, CCS.
[38] Siddharth Garg,et al. Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation , 2013, USENIX Security Symposium.
[39] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[40] Jarrod A. Roy,et al. Ending Piracy of Integrated Circuits , 2010, Computer.
[41] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.
[42] Claude Castelluccia,et al. Extending SAT Solvers to Cryptographic Problems , 2009, SAT.
[43] Farinaz Koushanfar,et al. Active Hardware Metering for Intellectual Property Protection and Security , 2007, USENIX Security Symposium.
[44] Yoav Shoham,et al. Understanding Random SAT: Beyond the Clauses-to-Variables Ratio , 2004, CP.
[45] Miodrag Potkonjak,et al. Watermarking techniques for intellectual property protection , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[46] Hector J. Levesque,et al. Hard and Easy Distributions of SAT Problems , 1992, AAAI.
[47] Jeyavijayan Rajendran,et al. Security analysis of Anti-SAT , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[48] Siddharth Garg,et al. Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes , 2015, NDSS.
[49] Joseph Zambreno,et al. Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.
[50] G. S. Tseitin. On the Complexity of Derivation in Propositional Calculus , 1983 .