搜索结果: 1-15 共查到“军事学 Logic”相关记录41条 . 查询时间(0.066 秒)
Ci-Lock: Cipher Induced Logic Locking Resistant Against SAT Attacks
Logic locking Block cipher Hardware obfuscation
2019/8/30
Protection of intellectual property (IP) cores is one of the most practical security concern for modern integrated circuit (IC) industry. Albeit being well-studied from a practical perspective, the pr...
Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design
SAT attack Logic locking Secure scan
2019/8/20
Logic locking has emerged as a promising solution against IP piracy and modification by untrusted entities in the integrated circuit design process. However, its security is challenged by boolean sati...
Logic encryption, a method to lock a circuit from unauthorized use unless the correct key is provided, is the most important technique in hardware IP protection. However, with the discovery of the SAT...
The End of Logic Locking? A Critical View on the Security of Logic Locking
Logic Locking Logic Encryption
2019/7/15
With continuously shrinking feature sizes of integrated circuits, the vast majority of semiconductor companies have become fabless, i.e., chip manufacturing has been outsourced to foundries across the...
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes
Logic Locking Optical Contactless Probing Tamper-proof Memory
2019/6/19
Logic locking has been proposed as an obfuscation technique to protect outsourced IC designs from Intellectual Property (IP) piracy by untrusted entities in the design and fabrication process. It obfu...
Vulnerability and Remedy of Stripped Function Logic Locking
Logic Locking SAT-based Attack Stripped Function Logic Locking
2019/2/26
Stripped Function Logic Locking (SFLL) as the most advanced logic locking technique is robust against both the SAT-based and the removal attacks under the assumption of thorough resynthesis of the str...
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption
logic encryption SAT-based attack cyclic circuit
2019/1/26
Cyclic logic encryption is newly proposed in the area of hardware security. It introduces feedback cycles into the circuit to defeat existing logic decryption techniques. To ensure that the circuit is...
CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States
logic encryption SAT-based attack cyclic circuit
2019/1/26
Logic encryption has attracted much attention due to increasing IC design costs and growing number of untrusted foundries. Unreachable states in a design provide a space of flexibility for logic encry...
SigAttack: New High-level SAT-based Attack on Logic Encryptions
logic encryption attack SAT
2019/1/26
Logic encryption is a powerful hardware protection technique that uses extra key inputs to lock a circuit from piracy or unauthorized use. The recent discovery of the SAT-based attack with Distinguish...
Secure and Effective Logic Locking for Machine Learning Applications
Logic Locking SAT Attack Machine Learning Applications
2019/1/9
Logic locking has been proposed as a strong protection of intellectual property (IP) against security threats in the IC supply chain especially when the fabrication facility is untrusted. Various tech...
This paper proposes Functional Analysis attacks on state of the art Logic Locking algorithms (abbreviated as FALL attacks). FALL attacks have two stages. The first stage identifies nodes involved in t...
Efficient Erasable PUFs from Programmable Logic and Memristors
Physical Unclonable Functions PUF Re-use Model Memristor Erasable PUFs
2018/4/19
At Oakland 2013, R{\"u}hrmair and van Dijk showed that many advanced PUF (Physical Unclonable Function)-based security protocols (e.g. key agreement, oblivious transfer, and bit commitment) can be vul...
In the setting of secure computation, a set of parties wish to compute a joint function of their private inputs without revealing anything but the output. Garbled circuits, first introduced by Yao, ar...
SAT-based Bit-flipping Attack on Logic Encryptions
logic encryption SAT-based attack security analysis
2017/12/6
Logic encryption is a hardware security technique that uses extra key inputs to prevent unauthorized use of a circuit. With the discovery of the SAT-based attack, new encryption techniques such as SAR...
A Comparative Investigation of Approximate Attacks on Logic Encryptions
logic encryption SAT-based attack approximate attack
2017/10/12
Logic encryption is an important hardware protection technique that adds extra keys to lock a given circuit. With recent discovery of the effective SAT-based attack, new enhancement methods such as SA...