Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4889
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMazumdar, Bodhisatwaen_US
dc.contributor.authorBairwa, Ghanshyamen_US
dc.contributor.authorMandal, Souviken_US
dc.contributor.authorNikhil, Tatavarthy Venkaten_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:54Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:54Z-
dc.date.issued2019-
dc.identifier.citationMazumdar, B., Saha, S., Bairwa, G., Mandal, S., & Nikhil, T. V. (2019). Classical cryptanalysis attacks on logic locking techniques. Journal of Electronic Testing: Theory and Applications (JETTA), 35(5), 641-654. doi:10.1007/s10836-019-05838-4en_US
dc.identifier.issn0923-8174-
dc.identifier.otherEID(2-s2.0-85075477168)-
dc.identifier.urihttps://doi.org/10.1007/s10836-019-05838-4-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4889-
dc.description.abstractLogic locking is a protection technique for outsourced integrated circuit (IC) designs that thwarts IC piracy and IC counterfeiting by untrusted foundries. In this technique, the IC design house locks the correct functionality of the circuit using a key that is known only to the trusted entities in the design house. As the correct key values are provided by the design house after production, a malicious adversary in the foundry house will not be able to unlock overproduced or counterfeit ICs. In this paper, we mount linear approximation attacks and differential attacks on random logic locking (RLL), fault-analysis based logic locking (FLL), and strong logic locking (SLL) techniques. We present a formal approach to mount the linear approximation attack on multiple circuit partitions and thereafter combining the approximations to form the attack on a locked logic cone of the circuit. We present our results on ISCAS’85 benchmark circuits. In linear approximation attack, the combinatorial blocks are partitioned and expressed as linear expressions to derive a relation between the primary inputs and the primary outputs of the circuit. The attack aims to determine the linear approximation that has the highest probability of occurrence for the correct key input. In differential attacks, we could recover the embedded secret key in device with attack effort lesser than exhaustive search attack. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.en_US
dc.language.isoenen_US
dc.publisherSpringeren_US
dc.sourceJournal of Electronic Testing: Theory and Applications (JETTA)en_US
dc.subjectFoundriesen_US
dc.subjectHousesen_US
dc.subjectIntegrated circuit designen_US
dc.subjectIntegrated circuitsen_US
dc.subjectKeys (for locks)en_US
dc.subjectLocks (fasteners)en_US
dc.subjectSide channel attacken_US
dc.subjectInput differentialen_US
dc.subjectKey gateen_US
dc.subjectLinear approximationsen_US
dc.subjectLogic lockingen_US
dc.subjectOutput differentialen_US
dc.subjectComputer circuitsen_US
dc.titleClassical Cryptanalysis Attacks on Logic Locking Techniquesen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: