|
[1] Luca Amar ́u et al. The epfl combinational benchmark suite. In IWLS, 2015. [2] J. Rajendran et al. Security analysis of logic obfuscation. In DAC, pages 83–89, 2012. [3] P. Subramanyan et al. Evaluating the security of logic encryption algorithms. In HOST, pages 137–143, 2015. [4] Y. Xie and A. Srivastava. Anti-sat: Mitigating sat attack on logic locking. IEEE TCAD, 38(2):199–207, Feb 2019. [5] M. Yasin et al. Sarlock: Sat attack resistant logic locking. In HOST, pages 236–241, 2016. [6] Meng Li, Kaveh Shamsi, Travis Meade, Zheng Zhao, Bei Yu, Yier Jin, and David Z. Pan. Provably secure camouflaging strategy for ic protection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 38(8):1399–1412, 2019. [7] Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan J V Rajendran, and Ozgur Sinanoglu. Ttlock: Tenacious and traceless logic locking. In 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 166–166, 2017. [8] Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan (JV) Rajendran, and Ozgur Sinanoglu. Provably-secure logic locking: From theory to practice. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS ’17, page 1601–1618, New York, NY, USA, 2017. Association for Computing Machinery. [9] K. Shamsi et al. Appsat: Approximately deobfuscating integrated circuits. In HOST, pages 95–100, 2017. [10] Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, and Jeyavijayan Rajen- dran. Security analysis of anti-sat. In 2017 22nd Asia and South Pacific Design Au- tomation Conference (ASP-DAC), pages 342–347, 2017. [11] X. Xu et al. Novel bypass attack and bdd-based tradeoff analysis against all known logic locking attacks. In CHES, pages 189–210, 2017. [12] Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, and Ozgur Sinanoglu. Gnnunlock: Graph neural networks-based oracle-less unlocking scheme for provably secure logic locking. In 2021 Design, Automa- tion Test in Europe Conference Exhibition (DATE), pages 780–785, 2021. [13] Abhrajit Sengupta, Mohammed Nabeel, Nimisha Limaye, Mohammed Ashraf, and Ozgur Sinanoglu. Truly stripping functionality for logic locking: A fault-based per- spective. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(12):4439–4452, 2020. [14] Jingbo Zhou and Xinmiao Zhang. Generalized sat-attack-resistant logic locking. IEEE TIFS, 16:2581–2592, 2021. [15] Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, and Ankur Srivastava. Strong anti-sat: Secure and effective logic locking. In 2020 21st International Symposium on Quality Electronic Design (ISQED), pages 199–205, 2020. [16] B. Shakya et al. Cas-lock: A security-corruptibility trade-off resilient logic locking scheme. In CHES, pages 175–202, 2020. [17] Z. Han et al. Does logic locking work with EDA tools? In USENIX, pages 1055–1072, 2021. [18] Nimisha Limaye, Satwik Patnaik, and Ozgur Sinanoglu. Valkyrie: Vulnerability as- sessment tool and attack for provably-secure logic locking techniques. IEEE TIFS, 17:744–759, 2022. [19] Yung-Chih CHEN. Smartlock: Sat attack and removal attack-resistant tree-based logic locking. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E103.A(5):733–740, 2020. [20] Kaveh Shamsi, Travis Meade, Meng Li, David Z. Pan, and Yier Jin. On the approxi- mation resiliency of logic locking and ic camouflaging schemes. IEEE Transactions on Information Forensics and Security, 14(2):347–359, 2019. [21] M. Yasin et al. Provably-secure logic locking: From theory to practice. In ACM CCS, pages 1601–1618, New York, NY, USA, 2017. [22] Y. Li et al. Obfuslock: An efficient obfuscated locking framework for circuit ip protec- tion. In DATE, pages 1–6, 2023. [23] J. Rajendran et al. Fault analysis-based logic encryption. IEEE TC, 64(2):410–424, Feb 2015. [24] M. Yasin et al. Removal attacks on logic locking and camouflaging techniques. IEEE TETC, 8(2):517–532, April-June 2020. [25] S. Yang. Logic synthesis and optimization benchmarks user guide: Version 3.0. MCNC, 1991. [26] R. Wang et al. Expanding in-cone obfuscated tree for anti sat attack. In DATE, pages 1–6, 2023. [27] Abc: Berkeley logic synthesis and verification group. ”ABC: A system for sequential synthesis and verification”. [28] F. Brglez. A neural netlist of 10 combinational benchmark circuits. In Proc. IEEE ISCAS: Special Session on ATPG and Fault Simulation, pages 151–158, 1985. [29] F. Corno et al. Rt-level itc’99 benchmarks and first atpg results. IEEE Design & Test of Computers, 17(3):44–53, 2000. |