2016
DOI: 10.1109/tcad.2015.2511144
|View full text |Cite
|
Sign up to set email alerts
|

On Improving the Security of Logic Locking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
177
0
2

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 279 publications
(179 citation statements)
references
References 28 publications
0
177
0
2
Order By: Relevance
“…For robust logic obfuscation, the key-related gate-bits are injected in a certain way into the design that causes the key information extraction process to be hard to achieve [22]. Yasin et al improved on the work through inserting more pairwise keys [5]. In [23], IC protection is done by insertion of process variation (PV) sensors inside the design at specific selected nodes along with generation of a unique key for each IC.…”
Section: Prior Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For robust logic obfuscation, the key-related gate-bits are injected in a certain way into the design that causes the key information extraction process to be hard to achieve [22]. Yasin et al improved on the work through inserting more pairwise keys [5]. In [23], IC protection is done by insertion of process variation (PV) sensors inside the design at specific selected nodes along with generation of a unique key for each IC.…”
Section: Prior Workmentioning
confidence: 99%
“…Even though the design of ICs has become very widespread, only a few countries (e.g., the USA and Japan) have a rigorous set of rules and regulations to prevent IC piracy from exposing or stealing electronic products [5][6][7][8][9]. A report from Information Handling Services (IHS) company in the USA showed that the untrusted ICs and the counterfeited chips have increased four-fold since 2009 [10].…”
Section: Introductionmentioning
confidence: 99%
“…In general, sensitization attacks use automatic test pattern generation (ATPG) tools to propagate the key-bits to the primary outputs of the encrypted design, while SAT attacks [23] can decrypt the locked circuit and reveal its secret key. A technique [24], namely strong logic locking (SLL) [24], was proposed to prevent propagating key-bits based attacks by inserting each two pairs of key-gates to a gate in the original circuit. They also incorporated Advanced Encryption Standard (AES) cryptography to prevent SAT attacks.…”
Section: Prior Workmentioning
confidence: 99%
“…Figure 9 shows the more resilient techniques against SAT-attack that we discuss in detail. Instead of directly connecting all of the key-bits to the key-gates in a locked circuit, some of the key-bits are fed as inputs to 32-bit AES cryptography [24]. Then, the outputs of AES are considered as the actual part of the key-bits, as illustrated in Figure 9a.…”
Section: Sat Based Attackmentioning
confidence: 99%
See 1 more Smart Citation