Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4869
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMazumdar, Bodhisatwaen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:49Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:49Z-
dc.date.issued2020-
dc.identifier.citationYasin, M., Mazumdar, B., Sinanoglu, O., & Rajendran, J. (2020). Removal attacks on logic locking and camouflaging techniques. IEEE Transactions on Emerging Topics in Computing, 8(2), 517-532. doi:10.1109/TETC.2017.2740364en_US
dc.identifier.issn2168-6750-
dc.identifier.otherEID(2-s2.0-85028506166)-
dc.identifier.urihttps://doi.org/10.1109/TETC.2017.2740364-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4869-
dc.description.abstractWith the adoption of a globalized and distributed IC design flow, IP piracy, reverse engineering, and counterfeiting threats are becoming more prevalent. Logic obfuscation techniques including logic locking and IC camouflaging have been developed to address these emergent challenges. A major challenge for logic locking and camouflaging techniques is to resist Boolean satisfiability (SAT) based attacks that can circumvent state-of-the-art solutions within minutes. Over the past year, multiple SAT attack resilient solutions such as Anti-SAT and AND-tree insertion (ATI) have been presented. In this paper, we perform a security analysis of these countermeasures and show that they leave structural traces behind in their attempts to thwart the SAT attack. We present three attacks, namely 'signal probability skew' (SPS) attack, 'AppSAT guided removal (AGR) attack, and 'sensitization guided SAT' (SGS) attack', that can break Anti-SAT and ATI, within minutes. © 2013 IEEE.en_US
dc.language.isoenen_US
dc.publisherIEEE Computer Societyen_US
dc.sourceIEEE Transactions on Emerging Topics in Computingen_US
dc.subjectBoolean functionsen_US
dc.subjectCryptographyen_US
dc.subjectFormal logicen_US
dc.subjectHardware securityen_US
dc.subjectIntegrated circuitsen_US
dc.subjectInternet protocolsen_US
dc.subjectLocks (fasteners)en_US
dc.subjectLogic gatesen_US
dc.subjectNetwork securityen_US
dc.subjectReverse engineeringen_US
dc.subjectBoolean satisfiabilityen_US
dc.subjectIP networksen_US
dc.subjectLayouten_US
dc.subjectLogic lockingen_US
dc.subjectSecurityen_US
dc.subjectComputer circuitsen_US
dc.titleRemoval Attacks on Logic Locking and Camouflaging Techniquesen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: