- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources4
- Resource Type
-
0002000002000000
- More
- Availability
-
40
- Author / Contributor
- Filter by Author / Creator
-
-
Asadizanjani, Navid (3)
-
Tehranipoor, Mark (3)
-
Rahman, M Tanjidur (2)
-
Rahman, M. Tanjidur (2)
-
Shen, Haoting (2)
-
Tajik, Shahin (2)
-
Woodard, Damon L. (2)
-
Farahmandi, Farimah (1)
-
Forte, Domenic (1)
-
Guin, Ujjwal (1)
-
Jain, Ayush (1)
-
Khalil, Waleed (1)
-
Rahman, M. Sazadur (1)
-
Shi, Qihang (1)
-
Vashistha, Nidish (1)
-
Wang, Huanyu (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
- Filter by Editor
-
-
null (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
null (Ed.)Logic Locking is a well-accepted protection technique to enable trust in the outsourced design and fabrication processes of integrated circuits (ICs) where the original design is modified by incorporating additional key gates in the netlist, resulting in a key-dependent functional circuit. The original functionality of the chip is recovered once it is programmed with the secret key, otherwise, it produces incorrect results for some input patterns. Over the past decade, different attacks have been proposed to break logic locking, simultaneously motivating researchers to develop more secure countermeasures. In this paper, we propose a novel stuck-at fault-based differential fault analysis (DFA) attack, which can be used to break logic locking that relies on a stored secret key. This proposed attack is based on self-referencing, where the secret key is determined by injecting faults in the key lines and comparing the response with its fault-free counterpart. A commercial ATPG tool can be used to generate test patterns that detect these faults, which will be used in DFA to determine the secret key. One test pattern is sufficient to determine one key bit, which results in at most |K| test patterns to determine the entire secret key of size |K|. The proposed attack is generic and can be extended to break any logic locked circuits.more » « less
-
Rahman, M. Tanjidur; Rahman, M. Sazadur; Wang, Huanyu; Tajik, Shahin; Khalil, Waleed; Farahmandi, Farimah; Forte, Domenic; Asadizanjani, Navid; Tehranipoor, Mark (, Integration)
-
Vashistha, Nidish; Rahman, M. Tanjidur; Shen, Haoting; Woodard, Damon L.; Asadizanjani, Navid; Tehranipoor, Mark (, Journal of Hardware and Systems Security)
-
Rahman, M Tanjidur; Shi, Qihang; Tajik, Shahin; Shen, Haoting; Woodard, Damon L.; Tehranipoor, Mark; Asadizanjani, Navid (, 2018 IEEE 3rd International Verification and Security Workshop (IVSW))