obfuscation technique
Recently Published Documents


TOTAL DOCUMENTS

49
(FIVE YEARS 22)

H-INDEX

6
(FIVE YEARS 0)

Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 8126
Author(s):  
Michael Yue ◽  
Sara Tehranipoor

Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit. Only the correct key can unlock the functionality of that circuit; otherwise, the system produces the wrong output. In an effort to hinder these threats on ICs, we have developed a probability-based logic-locking technique to protect the design of a circuit. Our proposed technique, called “ProbLock”, can be applied to both combinational and sequential circuits through a critical selection process. We used a filtering process to select the best location of key gates based on various constraints. Each step in the filtering process generates a subset of nodes for each constraint. We also analyzed the correlation between each constraint and adjusted the strength of the constraints before inserting key gates. We tested our algorithm on 40 benchmarks from the ISCAS ’85 and ISCAS ’89 suites. We evaluated ProbLock against a SAT attack and measured how long the attack took to successfully generate a key value. The SAT attack took longer for most benchmarks using ProbLock which proves viable security in hardware obfuscation.


Author(s):  
Vamsidhar Enireddy ◽  
K. Somasundaram ◽  
P. C. Senthil Mahesh M ◽  
M. Ramkumar Prabhu ◽  
D. Vijendra Babu ◽  
...  

2021 ◽  
Author(s):  
P. Shanmukha Naga Naidu ◽  
B. Naga Sumanth ◽  
Pavan Sri Ram Koduri ◽  
Bharat Surya ◽  
Geethu Remadevi Somanathan ◽  
...  

Electronics ◽  
2021 ◽  
Vol 10 (14) ◽  
pp. 1656
Author(s):  
Doru Florin Chiper ◽  
Laura-Teodora Cotorobai

This paper aims at solving one challenging problem in designing VLSI chips, namely, the security of the hardware, by presenting a new design approach that incorporates the obfuscation technique in the VLSI implementation of some important DSP algorithms. The proposed method introduces a new approach in obtaining a unified VLSI architecture for computing type IV discrete cosine transform (DCT-IV) and type IV discrete sine transform (DST-IV), with an efficient integration of the obfuscation technique, while maintaining low overheads. The algorithms for these two transforms were restructured in such a way that their structures are fairly similar, and thus they can be implemented on the same VLSI chip and on the same hardware with very few modifications, with the latter being attributed to the pre-processing and post-processing stages. The design proposed uses the regular and modular structures, which are named quasi-correlation, and the architecture is inspired by the paradigm of the systolic array architecture. Thus, the introduced design benefits the security, for the hardware, and also the advantages introduced by the use of the regular and modular structures. A very efficient, unified VLSI architecture for type IV DCT/DST can be obtained, which allows the computation of the two algorithms on the same hardware, allowing an efficient incorporation of the obfuscation technique with very low overheads, and it can be very efficiently implemented, offering high-speed performances and low hardware complexity, with the latter being attributed to the efficient use of the hardware resources for the computation of these two algorithms.


2020 ◽  
Vol 10 (4) ◽  
pp. 55-59
Author(s):  
Asma’a Mahfoud ◽  
Abu Bakar Md. Sultan ◽  
Abdul Azim Abd ◽  
Norhayati Mohd Ali ◽  
Novia Admodisastro

Integration ◽  
2020 ◽  
Vol 75 ◽  
pp. 178-188
Author(s):  
Vijaypal Singh Rathor ◽  
Bharat Garg ◽  
G.K. Sharma

Sign in / Sign up

Export Citation Format

Share Document