2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2017
DOI: 10.1109/hst.2017.7951805
|View full text |Cite
|
Sign up to set email alerts
|

AppSAT: Approximately deobfuscating integrated circuits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
96
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 251 publications
(107 citation statements)
references
References 17 publications
0
96
0
Order By: Relevance
“…We note that wire cutting has been demonstrated in the past [47], enabling such invasive attacks in principle. Besides, these schemes are also vulnerable to other algorithmic attacks [20]- [23]. This is because a key limitation of these schemes is that they induce low output corruptibility, allowing an attacker to obtain relatively easily an approximate version of the IP.…”
Section: Ieee Transactions On Computer-aided Design Of Integrated Cirmentioning
confidence: 99%
“…We note that wire cutting has been demonstrated in the past [47], enabling such invasive attacks in principle. Besides, these schemes are also vulnerable to other algorithmic attacks [20]- [23]. This is because a key limitation of these schemes is that they induce low output corruptibility, allowing an attacker to obtain relatively easily an approximate version of the IP.…”
Section: Ieee Transactions On Computer-aided Design Of Integrated Cirmentioning
confidence: 99%
“…To increase the output corruption, they could be augmented with other (output corruption oriented) obfuscation mechanisms. However, by using approximate SAT attack [23] almost all key values for the augmented obfuscation mechanism could be correctly identified.…”
Section: A Acyclic Logic Obfuscationmentioning
confidence: 99%
“…These SAT-resistant logic locking techniques that increase SAT attack complexity by increasing the number of required distinguishing input patterns (DIPs) [9], [8] or by striping some of the functionality of the logic locked design [56] and hiding it in the form of a secret key, possess their own critical vulnerabilities. For example, researchers have proposed Bypass attack [57], SPS attack [6], App-SAT attack [5], and FALL attack [89] that can easily circumvent the effect of the SAT-resistant locking schemes. Further, these SAT-resistant schemes are known to possess low corruptibility, and thus do not provide the desired functional obfuscation.…”
Section: F Defense For Logic Obfuscation Techniquesmentioning
confidence: 99%