- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources4
- Resource Type
-
0002000002000000
- More
- Availability
-
31
- Author / Contributor
- Filter by Author / Creator
-
-
Makris, Yiorgos (4)
-
Atulasimha, Jayasimha (2)
-
Bhattacharya, Dhritiman (2)
-
Hassan, Naimul (2)
-
Hu, Xuan (2)
-
Shihab, Mustafa (2)
-
Zhou, Peng (2)
-
Arzate, Jared D (1)
-
Basu, Kanad (1)
-
Beerel, Peter (1)
-
Broadfoot, Thomas (1)
-
Chin, Alexander N (1)
-
Dixit, Aneesh (1)
-
Edwards, Alexander J (1)
-
Edwards, Alexander J. (1)
-
Fowler, Aric (1)
-
Friedman, Joseph S (1)
-
Friedman, Joseph S. (1)
-
Han, Zhaokun (1)
-
Kundu, Shamik (1)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Locking-based intellectual property (IP) protection for integrated circuits (ICs) being manufactured at untrusted facilities has been largely defeated by the satisfiability (SAT) attack, which can retrieve the secret key needed for instantiating proprietary functionality on locked circuits. As a result, redaction-based methods have gained popularity as a more secure way of protecting hardware IP. Among these methods, transistor-level programming (TRAP) prohibits the outright use of SAT attacks due to the mismatch between the logic-level at which SAT attack operates and the switch-level at which the TRAP fabric is programmed. Herein, we discuss the challenges involved in launching SAT attacks on TRAP and we propose solutions which enable expression of TRAP in propositional logic modeling in a way that accurately reflects switch-level circuit capabilities. Results obtained using a transistor-level SAT attack tool-set that we developed and are releasing corroborate that SAT attacks can be launched against TRAP. However, the increased complexity of switch-level circuit modeling prevents the attack from realistically compromising all but the most trivial IP-protected designs.more » « lessFree, publicly-accessible full text available March 4, 2026
-
Han, Zhaokun; Shayan, Mohammed; Dixit, Aneesh; Shihab, Mustafa; Makris, Yiorgos; Rajendran, Jeyavijayan JV (, Proceedings of the USENIX conference)
-
Edwards, Alexander J; Hassan, Naimul; Arzate, Jared D; Chin, Alexander N; Bhattacharya, Dhritiman; Shihab, Mustafa M; Zhou, Peng; Hu, Xuan; Atulasimha, Jayasimha; Makris, Yiorgos; et al (, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems)
-
Hassan, Naimul; Edwards, Alexander J.; Bhattacharya, Dhritiman; Shihab, Mustafa M.; Venkat, Varun; Zhou, Peng; Hu, Xuan; Kundu, Shamik; Kuruvila, Abraham P.; Basu, Kanad; et al (, 2021 58th ACM/IEEE Design Automation Conference (DAC))Prevention of integrated circuit counterfeiting through logic locking faces the fundamental challenge of securing an obfuscation key against both physical and algorithmic threats. Previous work has focused on strengthening the logic encryption to protect the key against algorithmic attacks, but failed to provide adequate physical security. In this work, we propose a logic locking scheme that leverages the non-volatility of the nanomagnet logic (NML) family to achieve both physical and algorithmic security. Polymorphic NML minority gates protect the obfuscation key against algorithmic attacks, while a strain-inducing shield surrounding the nanomagnets provides physical security via a self-destruction mechanism.more » « less
An official website of the United States government

Full Text Available