2021
DOI: 10.1109/tvlsi.2021.3074004
|View full text |Cite
|
Sign up to set email alerts
|

ASSURE: RTL Locking Against an Untrusted Foundry

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
40
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 43 publications
(40 citation statements)
references
References 27 publications
0
40
0
Order By: Relevance
“…To protect the design, we focus on the locking techniques proposed in ASSURE [5]-one of the latest RTL locking policies. ASSURE offers three locking techniques: constant, branch, and operation obfuscation.…”
Section: The Concept Of Rtl Lockingmentioning
confidence: 99%
See 3 more Smart Citations
“…To protect the design, we focus on the locking techniques proposed in ASSURE [5]-one of the latest RTL locking policies. ASSURE offers three locking techniques: constant, branch, and operation obfuscation.…”
Section: The Concept Of Rtl Lockingmentioning
confidence: 99%
“…Hence, an addition is always locked in pair with a subtraction, and vice versa. Note that all other operations have predefined locking pairs [5]. In case an already locked pair is relocked, both 𝑇 and 𝑇 ′ are locked separately.…”
Section: The Concept Of Rtl Lockingmentioning
confidence: 99%
See 2 more Smart Citations
“…In [5], the whole arithmetic function is obfuscated rather than only constants. In [6], constants can be obfuscated by simply replacing their bits by key inputs which are stored in a memory. The obfuscation technique of [7] hides filter coefficients behind decoys.…”
Section: Introductionmentioning
confidence: 99%