20th International Symposium on Quality Electronic Design (ISQED) 2019
DOI: 10.1109/isqed.2019.8697421
|View full text |Cite
|
Sign up to set email alerts
|

On SAT-Based Attacks On Encrypted Sequential Logic Circuits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…14. Chain Based Encryption -Due to the limited ability of finding large flip-flop chains with low number of sneak paths, it has been shown [7] that the Chain Based technique is susceptible to the Sequential SAT attack and offers very little additional protection over a random insertion technique. 15.…”
Section: Key Interdependency -This Technique Ensures Large Overlap Be...mentioning
confidence: 99%
See 3 more Smart Citations
“…14. Chain Based Encryption -Due to the limited ability of finding large flip-flop chains with low number of sneak paths, it has been shown [7] that the Chain Based technique is susceptible to the Sequential SAT attack and offers very little additional protection over a random insertion technique. 15.…”
Section: Key Interdependency -This Technique Ensures Large Overlap Be...mentioning
confidence: 99%
“…Without a scan-accessible oracle circuit, the traditional SAT attack cannot be applied directly to sequential circuits. Therefore, new unrolling-based SAT attack methods [4,7,18] to decrypt sequential circuits have been proposed. These techniques have been successful in defeating popular sequential logic encryption techniques [3,5,7].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Once the counter reaches a threshold, the circuit enters the encryption mode. This scheme is more resilient to sequential SAT-based attacks [26] because it requires unrolling the circuit FSM a large number of times to find the key. However, the initial transparency window may still expose critical portions of the circuit functionality.…”
Section: Background and Related Workmentioning
confidence: 99%