scholarly journals Lockit: A Logic Locking Automation Software

Electronics ◽  
2021 ◽  
Vol 10 (22) ◽  
pp. 2817
Author(s):  
Nemanja Kajtez ◽  
Yue Zhang ◽  
Basel Halak

The significant rise in the cost of manufacturing nanoscale integrated circuits (ICs) has led the majority of IC design companies to outsource the fabrication of their products to other companies, often located in different countries. The multinational nature of the hardware supply chain has led to a host of security threats, including IP piracy, IC overproduction, and Trojan insertion. To combat these, researchers have proposed logic locking techniques to protect the intellectual properties of the design and increase the difficulty of malicious modification of its functionality. However, the adoption of logic locking approaches has been rather slow due to the lack of integration with the IC production process and the lack of efficacy of existing algorithms. This work automates the logic locking process by developing software using Python that performs the locking on a gate-level netlist, which can be integrated with the existing digital synthesis tools. Analysis of the latest logic locking algorithms has demonstrated that the SFLL-HD algorithm is one of the most secure and versatile when trading-off levels of protection against different types of attacks and was thus selected for implementation. The presented tool can also be expanded to incorporate the latest locking mechanisms to keep up with the fast-paced development in this field. The paper also presents a case study to demonstrate the functionality of the tool and how it could be used to explore the design space and compare different locking solutions.

Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


2021 ◽  
Vol 26 (4) ◽  
pp. 1-22
Author(s):  
Ayush Jain ◽  
Ziqi Zhou ◽  
Ujjwal Guin

Due to the globalization of semiconductor manufacturing and test processes, the system-on-a-chip (SoC) designers no longer design the complete SoC and manufacture chips on their own. This outsourcing of the design and manufacturing of Integrated Circuits (ICs) has resulted in several threats, such as overproduction of ICs, sale of out-of-specification/rejected ICs, and piracy of Intellectual Properties (IPs). Logic locking has emerged as a promising defense strategy against these threats. However, various attacks about the extraction of secret keys have undermined the security of logic locking techniques. Over the years, researchers have proposed different techniques to prevent existing attacks. In this article, we propose a novel attack that can break any logic locking techniques that rely on the stored secret key. This proposed TAAL attack is based on implanting a hardware Trojan in the netlist, which leaks the secret key to an adversary once activated. As an untrusted foundry can extract the netlist of a design from the layout/mask information, it is feasible to implement such a hardware Trojan. All three proposed types of TAAL attacks can be used for extracting secret keys. We have introduced the models for both the combinational and sequential hardware Trojans that evade manufacturing tests. An adversary only needs to choose one hardware Trojan out of a large set of all possible Trojans to launch the TAAL attack.


2006 ◽  
Vol 5 (1) ◽  
Author(s):  
Sarah L Stafford

AbstractAlthough most models of environmental compliance are based on a variation of the rational polluter model, regulated entities may not always intentionally decide to violate based on the relative costs and benefits of doing so. According to the complexity critique, a significant amount of noncompliance may be the result of ignorance about the requirements of the law. Using hazardous waste regulations as a case study, this paper examines the role that rationality and complexity play in environmental compliance. The results suggest that both are necessary to explain hazardous waste compliance behavior. In support of the rational polluter model, the results show that factors which increase the cost of compliance also increase the likelihood of a violation while factors that increase the likelihood of inspections and detection decrease the probability of a violation. In support of the complexity critique, the results show that larger facilities and facilities of multi-plant companies are less likely to violate, while facilities that are subject to more complex regulations are more likely to violate. Also in support of the complexity critique, facilities learn from past inspections and facilities in states with programs directed toward reducing complexity are less likely to violate. This mixed support holds across various subgroup of facilities, although there does appear to be some difference in the factors that contribute to different types of violations. In particular, non-management violations appear to be driven less by a rational comparison of the costs and benefits of violations than by the complexity of regulations.


2019 ◽  
Vol 5 (2) ◽  
pp. 38-45
Author(s):  
Helder Henrique Avelar

The development of integrated circuits becomes more complex and gets more susceptible to manufacturing errors as technology nodes get smaller. Along with that, the observability of more complex chips gets reduced, making it harder and more expensive to test. Therefore, the impact of different faults must be observed on the design as early as possible, in order to reduce the time to market and the cost of the fault to the project.Since many designs depend on Digital Signal Processing applications, this project proposes a case study of the implementation of a FIR filter design in Verilog and the analysis and comparison of its response by inserting stuck-at faults in its shift registers via test bench simulation.  


2021 ◽  
Vol 16 (4) ◽  
pp. 186-195
Author(s):  
Cenk Teker ◽  
Dogancan Cavmak ◽  
Hakan Avci

Objective: This study aims to calculate the medical costs of Covid-19 patients for hospitals based on the severity of clinical care. Design: The study was conducted in a hospital in Istanbul/Turkey. A micro-costing approach was performed using historical cost data for one year. All direct and indirect medical inputs were determined in quantities and monetary values for four types of Covid-19 patients in the hospital. Results: The analysis calculated the unit cost of an outpatient to be 459,99 ₺, while the cost per day for inpatient to be 1.184,63 ₺, for non-intubated in intensive care unit to be 1.938,11, for intubated in the intensive unit to be 2.393,99₺. The study also indicates that the total cost of a non-intubated patient in intensive care units is 1,54 times higher than the total cost per inpatient. An intubated patient’s cost is 2,08 times higher than an inpatient’s cost. Conclusion: This study indicates that Covid-19 patients incur significantly high costs for hospitals. The findings of the study provide empirical data for different types of patients which can be used in clinical management and can help all related governing bodies to plan their actions and make the decisions


2018 ◽  
Vol 11 (2) ◽  
pp. 229 ◽  
Author(s):  
Iván González Boubeta ◽  
Mar Fernández Vázquez ◽  
Pablo Domínguez Caamaño ◽  
José Carlos Prado Prado

Purpose: The aim of this paper is to analyze the suitability of the packaging strategy of an important Spanish agro-food company, regarding to economic and environmental sustainability.Design/methodology/approach: Three different types of packaging are analyzed to obtain a diagnostic of the initial situation. In this process, cost and carbon footprint are calculated in order to measure the economic and environmental impacts, respectively. Then, a new packaging allocation logic is proposed with the aim of improving both aspects.Findings: The results show that the carbon footprint is strongly and positively affected by the cost reduction, showing the viability of a win-win relationship between both aspects.Research limitations/implications: The strength of this win-win relationship may be conditioned by the input values considered in this case study. Conversion factors used to calculate carbon footprint vary a lot among researchers, showing the need of standardization in this topic.Practical implications: Since the existence of a positive relationship between economic and environmental sustainability has been demonstrated, organizations should find this kind of situations in themselves to satisfy their own stakeholders.Originality/value: This article shows the potential of unite waste elimination with eco-friendly activities with the aim of increasing the competitiveness of companies. This paper also contributes to the knowledge of economic and environmental sustainability and reinforces theoretical aspects, paving the way for further research on these topics.


2010 ◽  
Vol 16 (3) ◽  
pp. 471-486 ◽  
Author(s):  
Diana Kalibatienė ◽  
Olegas Vasilecas

Modern information systems (IS) have widely penetrated into many kinds of social activities by helping to perform business operations and to interact with the surrounding environment. Since business is under jurisdiction of government's laws, business mission and polices, guidelines and other documents, these business restrictions should be implemented in a business supporting IS and effectively managed. A business rule approach is widely accepted in IS community as a way to express different types of business restrictions and constrain operation of components of an IS. Nowadays, there are number of methods and approaches to extract, define and implement business rules. However, there is no a commonly accepted standard for their modelling. In this paper an ontology‐based method for business rules modelling and implementation in the software of IS is presented. It allows to automate the transformation of rules from ontology to the software level and to reduce the cost of rules implementation and likelihood of errors. A case study is described in the paper also. Santrauka Pastaruoju metu informacines sistemos (IS) plačiai naudojamos įvairiose srityse verslo procesams valdyti. Verslo procesai ribojami ivairių taisyklių, apibrežiamų įstatymais ir teisės aktais, verslo politikos ir tikslų. Todel šios taisykles turi būti efektyviai igyvendintos ir valdomos verslą palaikančiose IS. Verslo taisyklių sąvoka plačiai pripažinta IS bendruomenėje kaip būdas išreikšti verslo ribojimus ir suvaržyti IS komponentus. Šiuo metu pasiūlyta nemažai metodu verslo taisyklėms išgauti iš dalykinės srities, apibrežti, modeliuoti ir igyvendinti. Tačiau ne vienas iš esamų metodų nėra pripažintas standartu, nes verslo taisyklių išgavimas, modeliavimas ir įgyvendinimas nėra trivialus uždavinys. Straipsnyje siūloma ontologija grindžiamas metodas verslo taisyklėms modeliuoti. Šis metodas leidžia automatizuoti verslo taisyklių įgyvendinimą, tam panaudojus ontologijoje apibrėžtas dalykines srities žinias. Straipsnyje pateiktas pavyzdys, kai siūlomas metodas pritaikomas dėstytojų kvalifikaciniams reikalavimams įgyvendinti aktyviu duomenų bazių valdymo sistemu SQL trigeriais.


2019 ◽  
Vol 81 ◽  
pp. 165-173
Author(s):  
Katarzyna Turoń

Different types of transport solutions that are to influence the sustainability of urban logistics are increasingly used around the world. The same applies to the opportunities offered by the implementation of shared mobility services. According to this idea, car-sharing systems are currently present on six continents of the world and it is anticipated that by 2025 there will be over 36 million users worldwide sharing car-sharing services. In line with this trend, it is worth paying attention to aspects that will encourage the public to use car-sharing services. Because the price is one of the main factors for the society during making a decision about using car-sharing services, the author decided to analyze the costs of car-sharing mobility. In the text basic assumptions about car-sharing services and their development were presented. Then, the article showed the analysis of the cost of using services on six continents in the line of temporary and parking fees. In addition, the work also refers to the impact of the type of vehicle fleet on the price level. The aim of the work was to assess the occurrence of differences between the services offered and the relation between costs and the assumptions of sustainable transport development.


2017 ◽  
Vol 1 (1) ◽  
pp. 1-16
Author(s):  
John Harner ◽  
Lee Cerveny ◽  
Rebecca Gronewold

Natural resource managers need up-to-date information about how people interact with public lands and the meanings these places hold for use in planning and decision-making. This case study explains the use of public participatory Geographic Information System (GIS) to generate and analyze spatial patterns of the uses and values people hold for the Browns Canyon National Monument in Colorado. Participants drew on maps and answered questions at both live community meetings and online sessions to develop a series of maps showing detailed responses to different types of resource uses and landscape values. Results can be disaggregated by interaction types, different meaningful values, respondent characteristics, seasonality, or frequency of visit. The study was a test for the Bureau of Land Management and US Forest Service, who jointly manage the monument as they prepare their land management plan. If the information generated is as helpful throughout the entire planning process as initial responses seem, this protocol could become a component of the Bureau’s planning tool kit.


Sign in / Sign up

Export Citation Format

Share Document