Proceedings of the 49th Annual Design Automation Conference 2012
DOI: 10.1145/2228360.2228377
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of logic obfuscation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
221
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 419 publications
(222 citation statements)
references
References 4 publications
1
221
0
Order By: Relevance
“…The aforementioned techniques are vulnerable to most serious reverse engineering attacks, such as sensitization [5] and Boolean Satisfiability (SAT) based attacks [23]. In general, sensitization attacks use automatic test pattern generation (ATPG) tools to propagate the key-bits to the primary outputs of the encrypted design, while SAT attacks [23] can decrypt the locked circuit and reveal its secret key.…”
Section: Prior Workmentioning
confidence: 99%
See 4 more Smart Citations
“…The aforementioned techniques are vulnerable to most serious reverse engineering attacks, such as sensitization [5] and Boolean Satisfiability (SAT) based attacks [23]. In general, sensitization attacks use automatic test pattern generation (ATPG) tools to propagate the key-bits to the primary outputs of the encrypted design, while SAT attacks [23] can decrypt the locked circuit and reveal its secret key.…”
Section: Prior Workmentioning
confidence: 99%
“…It is worth noting that the two reversed engineering attacks (propagated/isolated secret key [5] and SAT [23] attacks) assume that an attacker can get a functional IC from the market and obtain the encrypted chip by either IC design or reverse engineering in an untrusted foundry [5,23,36]. Therefore, an adversary can have access to the primary input-output pairs and can also reveal the structure of the circuit.…”
Section: Sat Based Attackmentioning
confidence: 99%
See 3 more Smart Citations