|
[1] K. Z. Azar et al., "SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks," IACR Trans. on Cryptographic Hardware and Embedded Systems, vol. 2019, no. 1, pp. 97-122, 2019. [2] J.-H. Chen et al., "Synthesis and Verication of Cyclic Combinational Circuits," in Proc. of SOCC, pp. 257-262, 2015. [3] Y.-C. Chen and C.-Y. Wang, "Fast Detection of Node Mergers using Logic Implications," in Proc. of ICCAD, pp. 785-788, 2009. [4] Y.-C. Chen and C.-Y.Wang, "Fast Node Merging with Don't Cares Using Logic Implications," IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, vol. 29, no. 11, pp. 1827-1832, 2010. [5] H.-Y. Chiang et al., "LOOPLock: LOgic OPtimization based Cyclic Logic Locking," IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, no. 10, pp. 2178-2191, 2020. [6] H. M. Kamali et al., "Full-Lock: Hard Distributions of SAT instances for Obfuscating Circuits using Fully Congurable Logic and Routing Blocks," in Proc. of DAC, pp. 1-6, 2019. [7] L. Li and A. Orailoglu, "Piercing Logic Locking Keys through Redundancy Identication," in Proc. of DATE, pp. 540-545, 2019. [8] A. Rezaei et al., "Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks," in Proc. of DATE, pp. 85-90, 2018. [9] A. Rezaei et al., "CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States," in Proc. of ASPDAC, pp. 358-363, 2019. [10] S. Roshanisefat et al., "SRClock: SAT-Resistant Cyclic Logic Locking for Protecting the Hardware," in Proc. of GLSVLSI, pp. 153-158, 2018. [11] S. Roshanisefat et al., "SAT-Hard Cyclic Logic Obfuscation for Protecting the IP in the Manufacturing Supply Chain," IEEE Trans. on Very Large Scale Integration Systems, vol. 28, no. 4, pp. 954-967, 2020. [12] J. A. Roy et al., "Ending Piracy of Integrated Circuits," Computer, vol. 43, no. 10, pp. 30-38, 2010. [13] J. P. Roth et al., "Programmed Algorithms to Compute Tests to Detect and Distinguish Between Failures in Logic Circuits," IEEE Trans. on Electronic Computers, vol. EC-16, no. 5, pp. 567-580, 1967. [14] B. Shakya et al., "CAS-Lock: A Security-Corruptibility Trade-o Resilient Logic Locking Scheme," in IACR Trans. on Cryptographic Hardware and Embedded Systems, vol. 2020, no. 1, pp. 175-202, 2019. [15] K. Shamsi et al., "Cyclic Obfuscation for Creating SAT-Unresolvable Circuits," in Proc. of GLSVLSI, pp. 173-178, 2017. [16] K. Shamsi et al., "AppSAT: Approximately Deobfuscating Integrated Circuits," in Proc. of HOST, pp. 95-100, 2017. [17] Y. Shen et al., "BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption," in Proc. of ASPDAC, pp. 657-662, 2019. [18] Y. Shen et al., "A Comparative Investigation of Approximate Attacks on Logic Encryptions," in Proc. of ASPDAC, pp. 271-276, 2018. [19] Y. Shen et al., "SAT-based bitipping attack on logic encryptions," in Proc. of DATE, pp. 629-632, 2018. [20] Y. Shen and H. Zhou, "Double DIP: Re-Evaluating Security of Logic Encryption Algorithms," in Proc. of GLSVLSI, pp. 179-184, 2018. [21] Y. Shen et al., "SigAttack: New High-level SAT-based Attack on Logic Encryptions," in Proc. of DATE, pp. 940-943, 2019. [22] P. Subramanyan et al., "Evaluating the Security of Logic Encryption Algorithms," in Proc. of HOST, pp. 137-143, 2015. [23] Y. Xie and A. Srivastava, "Mitigating SAT Attack on Logic Locking," in Proc. of International Conference on Cryptographic Hardware and Embedded Systems, pp. 127-146, 2016. [24] Y. Xie and A. Srivastava, "Anti-SAT: Mitigating SAT Attack on Logic Locking," IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, vol. 38, no. 2, pp. 199-207, 2019. [25] X.-M. Yang et al., "LOOPLock 2.0: An Enhanced Cyclic Logic Locking Approach," IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, doi: 10.1109/TCAD.2021.3053912, 2021. [26] M. Yasin et al., "SARlock: SAT Attack Resistant Logic Locking," in Proc. of HOST, pp. 236-241, 2016. [27] M. Yasin et al., "Provably-Secure Logic Locking: From Theory To Practice," in Proc. of CCS, pp. 1601-1618, 2017. [28] M. Yasin et al., "Security Analysis of Anti-SAT," in Proc. of ASPDAC, pp. 342-347, 2016. [29] M. Yasin et al., "Removal Attacks on Logic Locking and Camouflaging Techniques," IEEE Trans. on Emerging Topics in Computing, vol. 8, no. 2, pp. 517-532, 2020. [30] H. Zhou et al., "CycSAT: SAT-Based Attack on Cyclic Logic Encryptions," in Proc. of ICCAD, pp. 49-56, 2017. [31] IWLS2005 Benchmarks. [Online]. Available: http://iwls.org/iwls2005/benchmarks.html [32] Berkeley Logic Synthesis and Verication Group, "ABC: a system for sequential synthesis and verication," Available: https://people.eecs.berkeley.edu/alanmi/abc/. |