To see the other types of publications on this topic, follow the link: Logic Obfuscation.

Journal articles on the topic 'Logic Obfuscation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Logic Obfuscation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Park, Beomsoo, and Nima Maghari. "Logic Obfuscation Through Enhanced Threshold Voltage Defined Logic Family." IEEE Transactions on Circuits and Systems II: Express Briefs 67, no. 12 (2020): 3407–11. http://dx.doi.org/10.1109/tcsii.2020.2993447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

LIU, Liang, Jiacheng ZHU, Zhe ZHANG, Lixiang SHEN, Yufeng SUN, and Dejun MU. "A logic obfuscation attack method based on gate-level information flow tracing techniques." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 42, no. 1 (2024): 78–83. http://dx.doi.org/10.1051/jnwpu/20244210078.

Full text
Abstract:
Logical obfuscation technique is a mainstream technical means to achieve intellectual property protection and prevent reverse engineering. In this paper, we propose a logical obfuscation attack method based on the gate-level information flow tracking technique, using the information flow analysis method at the gate-level abstraction level, establishing an information flow model, constraining the output and its contamination labels, and solving the obfuscation key sequence satisfying the constraints using an SAT solver. The experimental results show that the attack method has good cracking effe
APA, Harvard, Vancouver, ISO, and other styles
3

Thursday Ehis, Akhigbe-mudu. "Analytical Framework of Cloud Homomorphic Encryption / Cryptographic Logic Obfuscation for Cyber Health Hygiene." Journal of Technology Innovations and Energy 1, no. 2 (2022): 28–38. http://dx.doi.org/10.56556/jtie.v1i2.134.

Full text
Abstract:
Hacking and the resulting disaster have become so dangerous that developers and organizations are taking extra precautions to reduce their incidence and impact. A drift is any gap between the code and the cloud. Ad hoc adjustments can, of course, result in environment instability, deployment challenges, unpredictably high costs, and security or compliance gaps. The risk of configuration drift becoming a permanent fixture is one of the most important considerations on this study. One such strategic strategy to mitigate these behaviors and render it unavailable to tracking, interpretation, and u
APA, Harvard, Vancouver, ISO, and other styles
4

Akhigbe-mudu, Thursday Ehis. "Analytical Framework of Cloud Homomorphic Encryption / Cryptographic Logic Obfuscation for Cyber Health Hygiene." Journal of Technology Innovations and Energy 1, no. 2 (2022): 28–38. https://doi.org/10.5281/zenodo.6839004.

Full text
Abstract:
Hacking and the resulting disaster have become so dangerous that developers and organizations are taking extra precautions to reduce their incidence and impact. A drift is any gap between the code and the cloud. Ad hoc adjustments can, of course, result in environment instability, deployment challenges, unpredictably high costs, and security or compliance gaps. The risk of configuration drift becoming a permanent fixture is one of the most important considerations on this study. One such strategic strategy to mitigate these behaviors and render it unavailable to tracking, interpretation, and u
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Jiliang. "A Practical Logic Obfuscation Technique for Hardware Security." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24, no. 3 (2016): 1193–97. http://dx.doi.org/10.1109/tvlsi.2015.2437996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hoque, Tamzidul, Rajat Subhra Chakraborty, and Swarup Bhunia. "Hardware Obfuscation and Logic Locking: A Tutorial Introduction." IEEE Design & Test 37, no. 3 (2020): 59–77. http://dx.doi.org/10.1109/mdat.2020.2984224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lilly, Carol S. "Amoral Realism or Immoral Obfuscation?" Slavic Review 55, no. 4 (1996): 749–54. http://dx.doi.org/10.2307/2501234.

Full text
Abstract:
In his article, "Schindler's Fate: Genocide, Ethnic Cleansing, and Population Transfers," Robert Hayden combines comparative history, political commentary, and amoral realism. In the process, he presents a number of arguments with which it is difficult to disagree, but also many that are provocative and, indeed, offensive. Because Hayden makes so many arguments in this piece (both primary, secondary, and parenthetical; explicit and implicit; open and disguised) my critique will not follow the organization of his paper. Rather, it will challenge Hayden's article on three counts: 1) its factual
APA, Harvard, Vancouver, ISO, and other styles
8

Topaloglu, Rasit Onur. "Quantum Logic Locking for Security." J 6, no. 3 (2023): 411–20. http://dx.doi.org/10.3390/j6030027.

Full text
Abstract:
Having access to a unique quantum circuit that one wants to protect against use by others is a very likely scenario in industrial computing. However, currently, users rely on classical computer security schemes, which have known shortcomings. In this paper, we introduce a novel protection scheme along with a survey of other known methods to protect quantum information. In particular, we review physically unclonable functions (PUFs), obfuscation, and introduce quantum logic locking (QLL). The latter technique provisions end users to protect their circuit from an adversary through the use of a s
APA, Harvard, Vancouver, ISO, and other styles
9

Shamsi, Kaveh, Meng Li, Kenneth Plaks, Saverio Fazzari, David Z. Pan, and Yier Jin. "IP Protection and Supply Chain Security through Logic Obfuscation." ACM Transactions on Design Automation of Electronic Systems 24, no. 6 (2019): 1–36. http://dx.doi.org/10.1145/3342099.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mirmohammadi, Zahra, and Shahram Etemadi Borujeni. "A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking." Electronics 12, no. 5 (2023): 1107. http://dx.doi.org/10.3390/electronics12051107.

Full text
Abstract:
Effective resistance to intellectual property theft, reverse engineering, and hardware Trojan insertion in integrated circuit supply chains is increasingly essential, for which many solutions have been proposed. Accordingly, strong attacks are also designed in this field. One way to achieve the above goal is obfuscation. The hardware obfuscation method hides the primary function of the circuit and the normal Netlist from the attacker by adding several key gates in the original Netlist. The functionality circuit is correct only if the correct key is applied; otherwise, the circuit is obfuscated
APA, Harvard, Vancouver, ISO, and other styles
11

Yue, Michael, and Sara Tehranipoor. "A Novel Probability-Based Logic-Locking Technique: ProbLock." Sensors 21, no. 23 (2021): 8126. http://dx.doi.org/10.3390/s21238126.

Full text
Abstract:
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit. Only the correct key can unlock the functionality of that circuit; otherwise, the system produces the wrong output. In an effort to hinder these threats on ICs, we have developed a probability-based logic-locking technique to protect the design of a circuit. Our proposed technique, called “ProbLock”, can be applied to both combinational and sequential circuit
APA, Harvard, Vancouver, ISO, and other styles
12

Datta, Rajesh, Guangwei Zhao, Kanad Basu, and Kaveh Shamsi. "A Security Analysis of Circuit Clock Obfuscation." Cryptography 6, no. 3 (2022): 43. http://dx.doi.org/10.3390/cryptography6030043.

Full text
Abstract:
Key-based circuit obfuscation or logic-locking is a technique that can be used to hide the full design of an integrated circuit from an untrusted foundry or end-user. The technique is based on creating ambiguity in the original circuit by inserting “key” input bits into the circuit such that the circuit is unintelligible absent a correct secret key. Clock signals have traditionally been avoided in locking in order to not corrupt the timing behavior of the locked circuit. In this paper, we explore the case where the clock signal itself may be obfuscated by ambiguating its frequency or pattern.
APA, Harvard, Vancouver, ISO, and other styles
13

Wu, Jiaming, Olivia Dizon-Paradis, Sazadur Rahman, Damon L. Woodard, and Domenic Forte. "Protecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo-Random Number Generation." Cryptography 9, no. 1 (2025): 6. https://doi.org/10.3390/cryptography9010006.

Full text
Abstract:
Design-for-test/debug (DfT/D) introduces scan chain testing to increase testability and fault coverage by inserting scan flip-flops. However, these scan chains are also known to be a liability for security primitives. In previous research, the dynamically obfuscated scan chain (DOSC) was introduced to protect logic-locking keys from scan-based attacks by obscuring test patterns and responses. In this paper, we present DOSCrack, an oracle-guided attack to de-obfuscate DOSC using symbolic execution and binary clustering, which significantly reduces the candidate seed space to a manageable quanti
APA, Harvard, Vancouver, ISO, and other styles
14

Zhu, Tinghan. "Evaluating satisfiability modulo theorem solvers for code deobfuscation." Theoretical and Natural Science 51, no. 1 (2024): 91–96. http://dx.doi.org/10.54254/2753-8818/51/2024ch0178.

Full text
Abstract:
Abstract. Automated static program analysis is crucial in cybersecurity research and malware identification. With antivirus software (like Microsoft Windows Defender) employing malware detection algorithms that statically analyze programs that the users interact with, the performance and efficiency of automatic static program analysis becomes more important than ever. Code obfuscation is a tactic of complicating the program expression and logic without affecting its semantics to prevent reverse engineering. The prevalence of code obfuscation makes static program analysis difficult. Symbolic ex
APA, Harvard, Vancouver, ISO, and other styles
15

Alasad, Qutaiba, Jiann-Shuin Yuan, and Pramod Subramanyan. "Strong Logic Obfuscation with Low Overhead against IC Reverse Engineering Attacks." ACM Transactions on Design Automation of Electronic Systems 25, no. 4 (2020): 1–31. http://dx.doi.org/10.1145/3398012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Yang, Jianlei, Xueyan Wang, Qiang Zhou, et al. "Exploiting Spin-Orbit Torque Devices As Reconfigurable Logic for Circuit Obfuscation." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 38, no. 1 (2019): 57–69. http://dx.doi.org/10.1109/tcad.2018.2802870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Bagul, Priyanka, and Vandana Inamdar. "Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification." International Journal of Reconfigurable Computing 2023 (July 3, 2023): 1–13. http://dx.doi.org/10.1155/2023/4550758.

Full text
Abstract:
As the reuse of IP cores or the development of frequently used hardware modules is gaining more attention in the semiconductor industry, the misappropriation of the owner’s identity is a rising concern. Therefore, imprinting the owner’s identity in the form of a watermark or signature on the IP core is essential to avoid intellectual property right (IPR) infringement. In view of this, a watermarking technique is proposed in the present manuscript. A constraint-based dynamic watermarking method to generate the owner’s signature is proposed in conjunction with the logic encryption-based hardware
APA, Harvard, Vancouver, ISO, and other styles
18

Natarajan, Baluprithviraj Krishnaswamy, and Vijayachitra Senniappan. "Logic obfuscation technique using configurable gate diffusion input for improved hardware security." IEICE Electronics Express 15, no. 19 (2018): 20180802. http://dx.doi.org/10.1587/elex.15.20180802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Vijayakumar, Arunkumar, Vinay C. Patil, Daniel E. Holcomb, Christof Paar, and Sandip Kundu. "Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques." IEEE Transactions on Information Forensics and Security 12, no. 1 (2017): 64–77. http://dx.doi.org/10.1109/tifs.2016.2601067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Roshanisefat, Shervin, Hadi Mardani Kamali, Houman Homayoun, and Avesta Sasan. "SAT-Hard Cyclic Logic Obfuscation for Protecting the IP in the Manufacturing Supply Chain." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28, no. 4 (2020): 954–67. http://dx.doi.org/10.1109/tvlsi.2020.2968552.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Analysis, of Hardware Security to Prevent the Scan Based Attacks by using Sticky Counter, Lavanya Rangu, G. Shanmugapriya Dr., and S. Gopala Krishna Mr. "10.31142/ijtsrd11335." International Journal of Trend in Scientific Research and Development 2, no. 3 (2018): 1266–78. https://doi.org/10.5281/zenodo.3577381.

Full text
Abstract:
Security of integrated circuits ICs has emerged as a major concern at different stages of IC life cycle, spanning design, test, fabrication and deployment. Modern ICs are becoming increasingly vulnerable to various forms of security threats, such as 1 illegaluse of hardware intellectual property IP IP Piracy. 2 Illegal manufacturing of IC IC Piracy. Designing of confidential ICs must satisfy many design rules in order to rectify the various attacks and to protect the secret data. Based on the concept of withholding information, on chip comparisons for actual and expected response. Obfuscation
APA, Harvard, Vancouver, ISO, and other styles
22

Ivanov, Michael A., Irina G. Konnova, Evgeniy A. Salikov, and Maria A. Stepanova. "Obfuscation of logic schemes of pseudo-random number generators based on linear and non-linear feedback shift registers." Bezopasnost informacionnyh tehnology 28, no. 1 (2021): 74–83. http://dx.doi.org/10.26583/bit.2021.1.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Gursky, Jacob, Martin J. Riedl, Katie Joseff, and Samuel Woolley. "Chat Apps and Cascade Logic: A Multi-Platform Perspective on India, Mexico, and the United States." Social Media + Society 8, no. 2 (2022): 205630512210947. http://dx.doi.org/10.1177/20563051221094773.

Full text
Abstract:
Chat apps such as WhatsApp, Telegram, and Signal are increasingly popular platforms for communication. Their sometimes-closed nature and encryption affordances present researchers, governments, and law enforcement with unique problems of access, traceability, and, ultimately, understanding. It also makes them useful vectors for sowing disinformation. This research assumes a multi-platform perspective, describing the particularities of how chat apps can be used toward disseminating mis- and disinformation by way of cascade logic—the means by which information in chat app ecologies is trafficked
APA, Harvard, Vancouver, ISO, and other styles
24

Fechan, Andriy, and Oleksii Khoverko. "Software code protection on the .NET platform." Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Ìnformacìjnì sistemi ta merežì 17 (June 2025): 17–33. https://doi.org/10.23939/sisn2025.17.017.

Full text
Abstract:
In the work, a study of the functioning of complex information systems is carried out, which is aimed at the analysis of existing protection methods, the development of the concept of the code transformation mechanism, which will ensure a high level of protection of .NET applications. The architecture of the .NET Framework with modern universal improvements is considered. One of the important elements is the Base Class Library (BCL), which is a set of base classes and libraries that provide standard functionality, such as working with files, networks, databases, text processing, and basic data
APA, Harvard, Vancouver, ISO, and other styles
25

Raj Parikh and Khushi Parikh. "A survey on AI-augmented Secure RTL design for hardware trojan prevention." International Journal of Science and Research Archive 14, no. 3 (2025): 486–95. https://doi.org/10.30574/ijsra.2025.14.3.0644.

Full text
Abstract:
Once, discrete circuit elements, called components, were heaped up on boards inside steel cages using wire-lead technology in just five short years. Fast forward to today, and your computer CPU fits about half an inch square on a chip. Both this constant miniaturization of electronic circuits and the rapid growth in the prevalence of third-party intellectual property parts have made hardware protection more worrisome than ever. Among all these issues, Hardware Trojans (HTs)—which represent corrupted or harmful additions during various design and fabrication stages—pose significant threats to s
APA, Harvard, Vancouver, ISO, and other styles
26

Boussaha, Soumaya, Lukas Hock, Miguel Bermejo, et al. "FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Entropy-based Thresholds." Proceedings on Privacy Enhancing Technologies 2024, no. 3 (2024): 540–60. http://dx.doi.org/10.56553/popets-2024-0092.

Full text
Abstract:
Browser fingerprinting is an effective technique to track web users by building a fingerprint from their browser attributes. It is also stealthy because the tracker uses legitimate JavaScript API calls offered by the browser engine, which can be obfuscated before they are sent to a (third-party) server. Current browser fingerprinting methodologies employ coarse-grained collection and classification techniques, such as binary classification of fingerprinters based on the number of non-obfuscated exfiltrated attributes. As a result, they produce inconsistent findings. Meanwhile, the privacy of m
APA, Harvard, Vancouver, ISO, and other styles
27

Bridges, Lauren. "Infrastructural obfuscation: unpacking the carceral logics of the Ring surveillant assemblage." Information, Communication & Society 24, no. 6 (2021): 830–49. http://dx.doi.org/10.1080/1369118x.2021.1909097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Nur Widiyasono, Siti Rahayu Selamat, Angga Sinjaya, Rianto, Randi Rizal, and Mugi Praseptiawan. "Investigation of Malware Redline Stealer Using Static and Dynamic Analysis Method Forensic." Journal of Advanced Research in Applied Sciences and Engineering Technology 48, no. 2 (2024): 49–62. http://dx.doi.org/10.37934/araset.48.2.4962.

Full text
Abstract:
Redline Stealer is a malware variant discovered in early March 2020 by proof point analyst. Redline is famous for its ability to bypass the antivirus scan. Redline Stealer was created by hacker with the purpose to steal victim’s information such as login data, password and credit card information from the browser application that used in infected computer. This research uses static and dynamic method to analyze redline stealer. The process of static analysis is carried out by observing the malware’s sample file, while dynamic analysis is carried out by monitoring malware’s activity when the ma
APA, Harvard, Vancouver, ISO, and other styles
29

Hu, Jiankun. "H. -Y. Tran, J. Hu and H. R. Pota, "Smart Meter Data Obfuscation With a Hybrid Privacy-Preserving Data Publishing Scheme Without a Trusted Third Party," in IEEE Internet of Things Journal, vol. 9, no. 17, pp. 16080-16095, 1 Sept.1, 2022, doi: 10.1109/JIOT.2022.3153043." IEEE Internet of Things Journal 9, no. 17 (2024): 16080–95. https://doi.org/10.5281/zenodo.10963525.

Full text
Abstract:
Abstract: Smart electricity meters as a prominent instance of the Internet of Things (IoT) have driven more efficient energy services in smart grids but also created growing concerns of consumer privacy. Homomorphic encryption of consumption data is a conventional solution for privacy protection, but it incurs a high computational burden to the resource-restrained smart meters (SMs) due to the encryption of high-frequency consumption readings. Perturbation is another major approach in providing the privacy protection of SM readings which is highly efficient. However, most existing perturbation
APA, Harvard, Vancouver, ISO, and other styles
30

Hou, Chongyang, Shuye Zhang, Rui Liu, et al. "Boosting flexible electronics with integration of two‐dimensional materials." InfoMat 6, no. 7 (2024): e12555. https://doi.org/10.1002/inf2.12555.

Full text
Abstract:
This dataset includes original TIFF and PNG data from original research within the project EBEAM. Precisely, there are 15 final, complex Figures, two Schemes, seven Tables, and the final PDF version of the article below: PDF of the article final version "Boosting flexible electronics with integration of two‐dimensional materials" Figure 1. Machine learning‐assisted temperature-pressure electronic skin with decoupling capability (TPD e skin) enables object recognition. (A) Principle of using machine learning to recognize objects via e‐skin. (B) Structure of a one‐dimensional convolutional neura
APA, Harvard, Vancouver, ISO, and other styles
31

Brito, Rodrigo, Stephen Joseph, and Edward Sellman. "Mindfulness “in” Education as a Form of Iatrogenesis." Journal of Transformative Education 19, no. 3 (2021): 261–83. http://dx.doi.org/10.1177/1541344620987231.

Full text
Abstract:
Mindfulness-based interventions (MBIs) can result in positive “side effects,” such as concentration and individual well-being, highly desirable to schools operating within a neoliberalist agenda emphasizing performativity. However, employing a critical literature review, we argue that adverse side effects also occur, though under-researched. We engage critical and systems theories, within a broader complexity paradigm, to show how MBIs manifest as a form of “iatrogenesis,” whereby a “sleight of hand” occurs, offsetting systemic fallibility as individual culpability. Iatrogenesis provides both
APA, Harvard, Vancouver, ISO, and other styles
32

Cowan, Sarah Louise. "To Touch Time: U.S. Black Feminist Modernist Sculpture in the 1970s and 1980s." Arts 13, no. 1 (2024): 21. http://dx.doi.org/10.3390/arts13010021.

Full text
Abstract:
Modernist propositions long have been understood as atemporal—somehow outside of time—or insistently hailing the future. This temporal framework suppresses the contributions of those excluded from modernist canons, particularly Black women. In this article, visual and material analysis of sculptural works produced in the 1970s and 1980s by U.S. Black women artists Beverly Buchanan, Senga Nengudi, and Betye Saar reveal how Black feminists have engaged with modernist protocols in order to redress cultural erasures of Black women. These practices exemplify Black feminist modernisms, or creative p
APA, Harvard, Vancouver, ISO, and other styles
33

Kuipers, Giselinde, Thomas Franssen, and Sylvia Holla. "Clouded judgments? Aesthetics, morality and everyday life in early 21st century culture." European Journal of Cultural Studies 22, no. 4 (2019): 383–98. http://dx.doi.org/10.1177/1367549419861634.

Full text
Abstract:
This special issue investigates the relationship between aesthetics and morality. How do the good and the beautiful, the bad and the ugly, happen in everyday life? How do these ‘orders of worth’ interact? Do they reinforce each other? What happens when they contradict one another? Does one order typically trump the other? Five contributions, from Israel, Italy and the Netherlands, scrutinize different sites where both aesthetics – the continuum of evaluations from beautiful to ugly – and morality – evaluations about good and evil, right and wrong – have a strong presence. The contributions zoo
APA, Harvard, Vancouver, ISO, and other styles
34

Chung, Andrew J. "Vibration, Difference, and Solidarity in the Anthropocene." Resonance 2, no. 2 (2021): 218–41. http://dx.doi.org/10.1525/res.2021.2.2.218.

Full text
Abstract:
Taking the new materialist and climate change themes of Ashley Fure’s The Force of Things: an Opera for Objects as a departure point, this article examines sound studies’ recent invocations of new materialist philosophy alongside this philosophy's foundational concern toward the Anthropocene ecological crisis. I argue that new materialist sonic thought retraces new materialism’s dubious ethical program by deriving equivalencies of moral standing from logically prior ontological equivalencies of material entities and social actors rooted in their shared capacities to vibrate. Some sonic thought
APA, Harvard, Vancouver, ISO, and other styles
35

Knox, Jeremy. "Project Pulse: co-designing the ‘smart’ campus with Internet of (teaching and learning) Things." Proceedings of the International Conference on Networked Learning 11 (May 14, 2018): 260–63. http://dx.doi.org/10.54337/nlc.v11.8764.

Full text
Abstract:
This short paper describes a research project which aims to co-design prototype Internet of Things (IoT) technologies with staff and students at a higher education institution in the UK. However, rather than adopting a technical approach, which would perceive devices simply as ‘problem solving’ instruments, this project seeks to engage with critical approaches to IoT through the use of speculative methods (Ross 2016), such as ‘design fictions’ and ‘objects-to-think-with’. This approach is intended to surface crucial conceptual and ethical issues for education, such as the radical intensificati
APA, Harvard, Vancouver, ISO, and other styles
36

de la Torre, Juan Carlos, Javier Jareño, José Miguel Aragón-Jurado, Sébastien Varrette, and Bernabé Dorronsoro. "Source code obfuscation with genetic algorithms using LLVM code optimizations." Logic Journal of the IGPL, May 14, 2024. http://dx.doi.org/10.1093/jigpal/jzae069.

Full text
Abstract:
Abstract With the advent of the cloud computing model allowing a shared access to massive computing facilities, a surging demand emerges for the protection of the intellectual property tied to the programs executed on these uncontrolled systems. If novel paradigm as confidential computing aims at protecting the data manipulated during the execution, obfuscating techniques (in particular at the source code level) remain a popular solution to conceal the purpose of a program or its logic without altering its functionality, thus preventing reverse-engineering on the program even with the help of
APA, Harvard, Vancouver, ISO, and other styles
37

Yu, Tongguang, Yixin Xu, Shan Deng, et al. "Hardware functional obfuscation with ferroelectric active interconnects." Nature Communications 13, no. 1 (2022). http://dx.doi.org/10.1038/s41467-022-29795-3.

Full text
Abstract:
AbstractExisting circuit camouflaging techniques to prevent reverse engineering increase circuit-complexity with significant area, energy, and delay penalty. In this paper, we propose an efficient hardware encryption technique with minimal complexity and overheads based on ferroelectric field-effect transistor (FeFET) active interconnects. By utilizing the threshold voltage programmability of the FeFETs, run-time reconfigurable inverter-buffer logic, utilizing two FeFETs and an inverter, is enabled. Judicious placement of the proposed logic makes it act as a hardware encryption key and enable
APA, Harvard, Vancouver, ISO, and other styles
38

Yu, Tongguang, Yixin Xu, Shan Deng, et al. "Hardware functional obfuscation with ferroelectric active interconnects." Nature Communications 13, no. 1 (2022). http://dx.doi.org/10.1038/s41467-022-29795-3.

Full text
Abstract:
AbstractExisting circuit camouflaging techniques to prevent reverse engineering increase circuit-complexity with significant area, energy, and delay penalty. In this paper, we propose an efficient hardware encryption technique with minimal complexity and overheads based on ferroelectric field-effect transistor (FeFET) active interconnects. By utilizing the threshold voltage programmability of the FeFETs, run-time reconfigurable inverter-buffer logic, utilizing two FeFETs and an inverter, is enabled. Judicious placement of the proposed logic makes it act as a hardware encryption key and enable
APA, Harvard, Vancouver, ISO, and other styles
39

Kolhe, Gaurav, Tyler David Sheaves, Sai Manoj P. D, et al. "Breaking the Design and Security trade-off of Look-up Table-based Obfuscation." ACM Transactions on Design Automation of Electronic Systems, February 18, 2022. http://dx.doi.org/10.1145/3510421.

Full text
Abstract:
Logic locking and Integrated Circuit (IC) camouflaging are the most prevalent protection schemes that can thwart most hardware security threats. However, the state-of-the-art attacks, including Boolean Satisfiability (SAT) and approximation-based attacks, question the efficacy of the existing defense schemes. Recent obfuscation schemes have employed reconfigurable logic to secure designs against various hardware security threats. However, they have focused on specific design elements such as SAT hardness. Despite meeting the focused criterion such as security, obfuscation incurs additional ove
APA, Harvard, Vancouver, ISO, and other styles
40

McDaniel, Isaac, Michael Zuzak, and Ankur Srivastava. "Removal of SAT-Hard Instances in Logic Obfuscation Through Inference of Functionality." ACM Transactions on Design Automation of Electronic Systems, June 25, 2024. http://dx.doi.org/10.1145/3674903.

Full text
Abstract:
Logic obfuscation is a prominent approach to protect intellectual property within integrated circuits during fabrication. Many attacks on logic locking have been proposed, particularly in the Boolean satifiability (SAT) attack family, leading to the development of stronger obfuscation techniques. Some obfuscation techniques, including Full-Lock and InterLock, resist SAT attacks by inserting SAT-hard instances into the design, making the SAT attack infeasible. In this work, we observe that this class of obfuscation leaves most of the original design topology visible to an attacker, who can reve
APA, Harvard, Vancouver, ISO, and other styles
41

Abideen, Zain Ul, Sumathi Gokulanathan, Muayad J. Aljafar, and Samuel Pagliarini. "An Overview of FPGA-inspired Obfuscation Techniques." ACM Computing Surveys, July 9, 2024. http://dx.doi.org/10.1145/3677118.

Full text
Abstract:
Building and maintaining a silicon foundry is a costly endeavor that requires substantial financial investment. From this scenario, the semiconductor business has largely shifted to a fabless model where the Integrated Circuit (IC) supply chain is globalized but potentially untrusted. In recent years, several hardware obfuscation techniques have emerged to thwart hardware security threats related to untrusted IC fabrication. Reconfigurable-based obfuscation schemes have shown great promise of security against state-of-the-art attacks – these are techniques that rely on the transformation of st
APA, Harvard, Vancouver, ISO, and other styles
42

Zuzak, Michael, Yuntao Liu, and Ankur Srivastava. "Security-Aware Resource Binding to Enhance Logic Obfuscation." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023, 1. http://dx.doi.org/10.1109/tcad.2023.3294453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

S., Praveen, and Sojan Lal P. "Array Data Transformation for Source Code Obfuscation." December 27, 2007. https://doi.org/10.5281/zenodo.1057421.

Full text
Abstract:
Obfuscation is a low cost software protection methodology to avoid reverse engineering and re engineering of applications. Source code obfuscation aims in obscuring the source code to hide the functionality of the codes. This paper proposes an Array data transformation in order to obfuscate the source code which uses arrays. The applications using the proposed data structures force the programmer to obscure the logic manually. It makes the developed obscured codes hard to reverse engineer and also protects the functionality of the codes.
APA, Harvard, Vancouver, ISO, and other styles
44

Moraitis, Michail, and Elena Dubrova. "FPGA Design Deobfuscation by Iterative LUT Modification at Bitstream Level." Journal of Hardware and Systems Security, February 16, 2023. http://dx.doi.org/10.1007/s41635-022-00130-y.

Full text
Abstract:
AbstractHardware obfuscation is a well-known countermeasure against reverse engineering. For FPGA designs, obfuscation can be implemented with a small overhead by using underutilised logic cells; however, its effectiveness depends on the stealthiness of the added redundancy. In this paper, we show that it is possible to deobfuscate an SRAM FPGA design by ensuring the full controllability of each instantiated look-up table input via iterative bitstream modification. The presented algorithm works directly on bitstream and does not require the possession of a flattened netlist. The feasibility of
APA, Harvard, Vancouver, ISO, and other styles
45

Hassan, Rakibul, Gaurav Kolhe, Setareh Rafatirad, Houman Homayoun, and Sai Manoj Pudukotai Dinakarrao. "A Neural Network-based Cognitive Obfuscation Towards Enhanced Logic Locking." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021, 1. http://dx.doi.org/10.1109/tcad.2021.3138686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Deepak, V. A., M. Priyatharishini, and M. Nirmala Devi. "Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques." International Journal of Electronics and Telecommunications, July 20, 2023. http://dx.doi.org/10.24425/ijet.2019.129790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Baluprithviraj, K. N., S. Vijayachitra, and N. Mahesh. "Logic Locking Based Configurable Obfuscation Cell for Enhanced IC Security." Journal of Electronic Testing, April 26, 2025. https://doi.org/10.1007/s10836-025-06171-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Aljafar, Muayad J., Florence Azais, Marie-Lise Flottes, and Samuel Pagliarini. "Utilizing layout effects for analog logic locking." Journal of Cryptographic Engineering, April 6, 2024. http://dx.doi.org/10.1007/s13389-024-00350-8.

Full text
Abstract:
AbstractWhile numerous obfuscation techniques are available for securing digital assets in the digital domain, there has been a notable lack of focus on protecting intellectual property (IP) in the analog domain. This is primarily due to the relatively smaller footprint of analog components within an integrated circuit (IC), with the majority of the surface dedicated to digital elements. However, despite their smaller nature, analog components are highly valuable IP and warrant effective protection. In this paper, we present a groundbreaking method for safeguarding analog IP by harnessing layo
APA, Harvard, Vancouver, ISO, and other styles
49

Azar, Kimia Zamiri, Hadi Mardani Kamali, Houman Homayoun, and Avesta Sasan. "SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks." IACR Transactions on Cryptographic Hardware and Embedded Systems, November 9, 2018, 97–122. http://dx.doi.org/10.46586/tches.v2019.i1.97-122.

Full text
Abstract:
In this paper, we introduce the Satisfiability Modulo Theory (SMT) attack on obfuscated circuits. The proposed attack is the superset of Satisfiability (SAT) attack, with many additional features. It uses one or more theory solvers in addition to its internal SAT solver. For this reason, it is capable of modeling far more complex behaviors and could formulate much stronger attacks. In this paper, we illustrate that the use of theory solvers enables the SMT to carry attacks that are not possible by SAT formulated attacks. As an example of its capabilities, we use the SMT attack to break a recen
APA, Harvard, Vancouver, ISO, and other styles
50

Karmakar, Rajit, Harshit Kumar, and Santanu Chattopadhyay. "Efficient Key-gate Placement And Dynamic Scan Obfuscation Towards Robust Logic Encryption." IEEE Transactions on Emerging Topics in Computing, 2020, 1. http://dx.doi.org/10.1109/tetc.2019.2963094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!