2020
DOI: 10.1109/tcad.2019.2944586
|View full text |Cite
|
Sign up to set email alerts
|

Keynote: A Disquisition on Logic Locking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
39
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 77 publications
(45 citation statements)
references
References 108 publications
0
39
0
Order By: Relevance
“…Several variants of the SAT attack have also been proposed [19]. The AppSAT attack [17] is an approximate version of the SAT attack.…”
Section: Advanced Defenses and Attacksmentioning
confidence: 99%
“…Several variants of the SAT attack have also been proposed [19]. The AppSAT attack [17] is an approximate version of the SAT attack.…”
Section: Advanced Defenses and Attacksmentioning
confidence: 99%
“…Locking is an end-to-end protection against potential attackers located anywhere in the IC supply chain [4]. A standard locking flow is depicted in Fig.…”
Section: Introductionmentioning
confidence: 99%
“…At present, the hardware security space has grown to a point with many different specialized topics and each topic has been discussed in several focused survey papers. Examples of recent surveys on a few specialized topics are side and covert channels [4], [23], [24], reverse engineering [25], hardware Trojan [26], [27], physical unclonable function [28], logic locking [29] and security verification tools [30]. This paper provides a concise overview of hardware security from three perspectives, namely threats, countermeasures and design tools, with emphasis on niche, uncharted topics and updated recent developments for hardware security in a mixed-trust environment.…”
Section: Introductionmentioning
confidence: 99%