|
[1] R. Torrance and D. James, “The State-of-the-Art in Semiconductor Reverse Engineering,” ACM/EDAC/IEEE Design Automation Conference (DAC), 2011. [2] SiliconZoo, The layman's guide to ic reverse engineering. [Online]. Available: http://siliconzoo.org/tutorial.html. [3] J. A. Roy, F. Koushanfar, and I. L. Markov, “EPIC: Ending Piracy of Integrated Circuits,” Design, Automation and Test in Europe, pp. 1069–1074, 2008. [4] SypherMedia, Syphermedia library circuit camouflage technology. [Online]. Available: https://go.rambus.com/circuit-camouflage-technology-product-brief. [5] M. Yasin and O. Sinanoglu, “Transforming between logic locking and IC camouflaging,” International Design & Test Symposium (IDT), pp. 1–4, 2015. [6] M. Yasin, A. Sengupta, M. T. Nabeel, M. Ashraf, J. Rajendran, and O. Sinanoglu, “ProvablySecure Logic Locking: From Theory To Practice,” ACM SIGSAC Conference on Computer and Communications Security, pp. 1601–1618, 2017. [7] M. Yasin, B. Mazumdar, O. Sinanoglu, and J. Rajendran, “CamoPerturb: Secure IC camouflaging for minterm protection,” IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1–8, 2016. [8] J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, “Security Analysis of Integrated Circuit Camouflaging,” ACM SIGSAC conference on Computer & communications security, pp. 709–720, 2013. [9] P. Subramanyan, S. Ray, and S. Malik, “Evaluating the security of logic encryption algorithms,” IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 137–143, 2015. [10] L.-Y. Su and S.-H. Huang, “A Metal-Only ECO Algorithm for Improving Hardware Security with Gate Camouflaging,” 2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan), 2023. [11] C. Yu, X. Zhang, D. Liu, M. Ciesielski, and D. Holcomb, “Incremental SAT-Based Reverse Engineering of Camouflaged Logic Circuits,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 36, no. 10, pp. 1647–1659, 2017. [12] M. Yasin, J. J. Rajendran, O. Sinanoglu, and R. Karri, “On Improving the Security of Logic Locking,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 9, pp. 1411–1424, 2016. [13] J. Borgho, A. Canteaut, T. Guneysu, et al., “PRINCE—A low-latency block cipher for pervasive computing applications,” in Proc. Int. Conf. Theory Appl. Cryptol. Inf. Security, pp. 208–225, 2012. [14] A. Bogdanov, L. Knudsen, G. Leander, C. Paar, A. Poschmann, M. Robshaw, Y. Seurin, and C. Vikkelsoe, “PRESENT: An ultra-lightweight block cipher,” in Proc. Int. Workshop Cryptograph. Hardw. Embedded Syst., pp. 450–466, 2007. [15] M. Li, K. Shamsi, T. Meade, Z. Zhao, Y. J. Bei Yu, and D. Z. Pan, “Provably Secure Camouflaging Strategy for IC Protection,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 38, no. 8, pp. 1399–1412, 2019. [16] K. Juretus and I. Savidis, “Characterization of In-Cone Logic Locking Resiliency Against the SAT Attack,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, no. 8, pp. 1607–1620, 2020. [17] A. Sengupta, M. Nabeel, N. Limaye, M. Ashraf, and O. Sinanoglu, “Truly Stripping Functionality for Logic Locking: A Fault-Based Perspective,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, no. 12, pp. 4439–4452, 2020. [18] L. Alrahis, S. Patnaik, M. Shafique, and O. Sinanoglu, “OMLA: An Oracle-Less Machine Learning-Based Attack on Logic Locking,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 69, no. 3, pp. 1602–1606, 2022. [19] N. Limaye, S. Patnaik, and O. Sinanoglu, “Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 744–759, 2022. [20] F. Brglez, “On testability of combinational networks,” Proc. IEEE International Symposium on Circuits and Systems, pp. 221–225, 1984. [21] S. Patnaik, N. Rangarajan, J. Knechtel, O. Sinanoglu, and S. Rakheja, “Spin-Orbit Torque Devices for Hardware Security: From Deterministic to Probabilistic Regime,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, no. 8, pp. 1591–1606, 2020. [22] F. Brglez, D. Bryan, and K. Kozminski, “Combinational profiles of sequential benchmark circuits,” 1989 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1929–1934, 1989. [23] F. Corno, M. S. Reorda, and G. Squillero, “RT-level ITC'99 benchmarks and first ATPG results,” IEEE Design & Test of Computers, vol. 17, no. 3, pp. 44–53, 2000. |