2018
DOI: 10.1007/s41635-018-0044-3
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 57 publications
0
4
0
Order By: Relevance
“…One big assumption of this threat model is that the scan chain structure is unknown to the adversary. However, many recent studies demonstrate and validate the possibility of successfully reverse-engineering an IC and a PCB via delayering, imaging, annotation, and netlist extraction [72], [73]. Thus, since the adversary has access to the successfully reverseengineered netlist, many of the previously discussed secure scan architectures would be invalid, particularly those architectures that manipulated the scan chain structure without the insertion of the key, such as flipped scan, feedback XORed scan, and state dependent scan.…”
Section: More Advanced Secure Scan Chain Architectures In the Presence Of Logic Obfuscationmentioning
confidence: 99%
“…One big assumption of this threat model is that the scan chain structure is unknown to the adversary. However, many recent studies demonstrate and validate the possibility of successfully reverse-engineering an IC and a PCB via delayering, imaging, annotation, and netlist extraction [72], [73]. Thus, since the adversary has access to the successfully reverseengineered netlist, many of the previously discussed secure scan architectures would be invalid, particularly those architectures that manipulated the scan chain structure without the insertion of the key, such as flipped scan, feedback XORed scan, and state dependent scan.…”
Section: More Advanced Secure Scan Chain Architectures In the Presence Of Logic Obfuscationmentioning
confidence: 99%
“…The outsourcing of fabrication in the semiconductor supply chain has exposed it to numerous security threats, including Integrated Circuit (IC) piracy, counterfeiting, overproduction, and hardware Trojans [1][2][3][4]. These threats have resulted in significant annual losses, estimated at $4 billion a decade ago [5].…”
Section: Introductionmentioning
confidence: 99%
“…To prevent the adversaries from such attacks, researchers have proposed various obfuscation methods for hiding and/or locking the functionality of a netlist [3][4][5][6][7]. However, the validity and strength of logic obfuscation to defend an IP against adversaries in the manufacturing supply chain was seriously challenged as researchers demonstrated that the de-obfuscation attacks leveraging satisfiability (SAT) solvers [8][9][10] combined with Signal Probability Skew (SPS) attacks [11] could break the existing obfuscation schemes (both locking and camouflaging) in a relatively short time.…”
Section: Introductionmentioning
confidence: 99%