Proceedings of the 56th Annual Design Automation Conference 2019 2019
DOI: 10.1145/3316781.3317831
|View full text |Cite
|
Sign up to set email alerts
|

Full-Lock

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 94 publications
(9 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…Another approach to resisting the miter-based SAT attack is adding densely-interconnected instances into the circuit, overwhelming the SAT solver [11]- [13]. These instances typically have many interdependent keys.…”
Section: Point Function-based and Densely-interconnected Locksmentioning
confidence: 99%
See 1 more Smart Citation
“…Another approach to resisting the miter-based SAT attack is adding densely-interconnected instances into the circuit, overwhelming the SAT solver [11]- [13]. These instances typically have many interdependent keys.…”
Section: Point Function-based and Densely-interconnected Locksmentioning
confidence: 99%
“…From the point-function based locks, we implement SFLL-Flex [16]. Finally, from the densely-interconnected locks, we implement Full-Lock [11] and LEBL [13]. Our miter-based attack implementation uses the SAT solver CaD-iCaL [17].…”
Section: Application Of Metricsmentioning
confidence: 99%
“…Full-Lock is a logic locking technique specifically developed to be resistant to the miter-based SAT attack [13] via increasing the execution time of each iteration. This is done by integrating SAT-hard logic into the circuit using a combination of routing obfuscation and look-up tables (LUT).…”
Section: Full-lockmentioning
confidence: 99%
“…Full-Lock utilizes configurable routing and LUTs to obfuscate a set of gates and their corresponding input connections. The configurable routing is implemented with Banyan networks, a class of logarithmic networks, that permutes connections based on a key [13]. The network is made up of a series of 2-input switch boxes which connect the inputs to the outputs, either directly passing through or switched.…”
Section: Full-lockmentioning
confidence: 99%
See 1 more Smart Citation