|
[1] Kimia Zamiri Azar et al., “SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks,” IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, pp. 97-122. [2] J.-H. Chen et al., “Synthesis and Verification of Cyclic Combinational Circuits,” in Proc. of SOCC, 2015, pp. 257-262. [3] Y.-C. Chen and C.-Y. Wang, “Fast Node Merging with Don’t Cares Using Logic Implications,” IEEE TCAD, pp. 1827-1832, 2010. [4] A. Chakraborty et al., “TimingSAT: Timing Profile Embedded SAT Attack,” in Proc. of ICCAD, 2018, pp. 6:1-6:6. [5] M. Chen et al., “Hardware Protection via Logic Locking Test Points,” IEEE TCAD, pp. 3020-3030, 2018. [6] J. A. Roy et al., “Ending Piracy of Integrated Circuits,” Computer, vol. 43, no. 10, pp. 30-38, 2010. [7] A. Rezaei et al., “Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks,” in Proc. of DATE, 2018, pp. 85-90. [8] S. Roshanisefat et al., “SRClock: SAT-resistant Cyclic Logic Locking for Protecting the Hardware,” in Proc. of GLSVLSI, 2018, pp. 153-158. [9] A. Sengupta and M. Rathor, “Security of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption Hardware,” IEEE Access, vol.7, pp. 4598-4610. [10] K. Shamsi et al., “Cyclic Obfuscation for Creating SAT-Unresolvable Circuits,” in Proc. of GLSVLSI, 2017, pp. 173-178. [11] K. Shamsi et al., “AppSAT: Approximately deobfuscating integrated circuits,” in Proc. of HOST, 2017, pp. 95-100. [12] P. Subramanyan et al., “Evaluating the Security of Logic Encryption Algorithms,” in Proc. of HOST, 2015, pp. 137-143. [13] Y. Xie and A. Srivastava, “Delay Locking: Security Enhancement of Logic Locking against IC Counterfeiting and Overproduction,” In Proc. of DAC, 2017, pp. 1-6. [14] Y. Xie and A. Srivastava, “Mitigating SAT Attack on Logic Locking,” in Proc. of International Conference on Cryptographic Hardware and Embedded Systems, 2016, pp. 127-146. [15] M. Yasin et al., “SARlock: SAT Attack Resistant Logic Locking,” in Proc. of Host, 2016, pp. 236-241. [16] M. Yasin et al., “Provably-Secure Logic Locking: From Theory To Practice,” in Proc. ACM Conf. on Computer Communications Security, 2017, pp. 1601-1618. [17] M. Yasin et al., “Removal Attacks on Logic Locking and Camouflaging Techniques,” IEEE Trans. on Emerging Topics in Computing, to be published, doi: 10.1109/TETC.2017.2740364. [18] M. Yasin et al., “Security Analysis of Anti-SAT,” in Proc. of ASPDAC, 2016, pp. 342-347. [19] G. Zhang et al., “TimingCamouflage: Improving circuit security against counterfeiting by unconventional timing,” in Proc. of DATE, 2018, pp. 91-96. [20] H. Zhou et al., “CycSAT: SAT-based attack on cyclic logic encryptions,” in Proc. of ICCAD, 2017, pp. 49-56. [21] IWLS2005 Benchmarks. [Online]. Available: http://iwls.org/iwls2005/benchmarks.html
|