By: Kimia Zamiri Azar (GMU), Hadi Mardani Kamali (GMU), Houman Homayoun (UC Davis), Avesta Sasan (GMU)
Stage: RTL
Summary
SMT Attack on Boolean and Non-Boolean Obfuscation Methods
Contact
Input/Output Interface
- Input: obfuscated netlist, original netlist
- Output: extracted key, de-obfuscation time
Dependencies
Licensing Info
The MIT License (MIT)
References
SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks Journal Article
In: IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2019, no. 1, pp. 97-122, 2018.