CAD for Assurance of Electronic Systems
 

Publications

Show all

2021

Sisejkovic, Dominik; Merchant, Farhad; Reimann, Lennart M; Srivastava, Harshit; Hallawa, Ahmed; Leupers, Rainer

Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach Journal Article

In: J. Emerg. Technol. Comput. Syst., vol. 17, no. 3, 2021, ISSN: 1550-4832.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation

2020

Karfa, Chandan; Chouksey, Ramanuj; Pilato, Christian; Garg, Siddharth; Karri, Ramesh

Is Register Transfer Level Locking Secure? Proceedings Article

In: 2020 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 550-555, 2020, ISSN: 1558-1101.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation

Zuzak, Michael; Srivastava, Ankur

ObfusGEM: Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design Proceedings Article

In: International Symposium on Memory Systems (MEMSYS), 2020.

BibTeX | Tags: Evaluation of Obfuscation

Hoque, Tamzidul; Chakraborty, Rajat Subhra; Bhunia, Swarup

Hardware Obfuscation and Logic Locking: A Tutorial Introduction Journal Article

In: IEEE Design Test, pp. 1-1, 2020, ISSN: 2168-2364.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation

2019

Alaql, Abdulrahman; Forte, Domenic; Bhunia, Swarup

Sweep to the Secret: A Constant Propagation Attack on Logic Locking Proceedings Article

In: 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 1-6, 2019.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation

Shamsi, Kaveh; Pan, David Z.; Jin, Yier

IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits Proceedings Article

In: 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1-7, IEEE, 2019.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation, Logic Locking

Shamsi, Kaveh; Li, Meng; Plaks, Kenneth; Fazzari, Saverio; Pan, David Z.; Jin, Yier

IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview Journal Article

In: ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 24, no. 6, pp. 1-36, 2019.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation

Shamsi, Kaveh; Pan, David Z.; Jin, Yier

On the Impossibility of Approximation-Resilient Circuit Locking Proceedings Article

In: 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 161-170, 2019.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation, Logic Locking

Chakraborty, Prabuddha; Cruz, Jonathan; Bhunia, Swarup

SURF: Joint Structural Functional Attack on Logic Locking Proceedings Article

In: 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 181-190, 2019.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation

Shamsi, Kaveh; Meade, Travis; Li, Meng; Pan, David Z.; Jin, Yier

On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes Journal Article

In: IEEE Transactions on Information Forensics and Security (TIFS), vol. 14, no. 2, pp. 347-359, 2019.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation

Hoque, Tamzidul; Yang, Kai; Karam, Robert; Tajik, Shahin; Forte, Domenic; Tehranipoor, Mark; Bhunia, Swarup

Hidden in Plaintext: An Obfuscation-Based Countermeasure against FPGA Bitstream Tampering Attacks Journal Article

In: ACM Trans. Des. Autom. Electron. Syst., vol. 25, no. 1, 2019, ISSN: 1084-4309.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation

2018

Chakraborty, Prabuddha; Cruz, Jonathan; Bhunia, Swarup

SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation Proceedings Article

In: 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 56-61, 2018.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation

Azar, Kimia Zamiri; Kamali, Hadi Mardani; Homayoun, Houman; Sasan, Avesta

SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks Journal Article

In: IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2019, no. 1, pp. 97-122, 2018.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation

2009

Chakraborty, Rajat Subhra; Bhunia, Swarup

HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection Journal Article

In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 28, no. 10, pp. 1493-1502, 2009, ISSN: 1937-4151.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation, Logic Locking, Obfuscation