2018 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC) 2018
DOI: 10.1109/vlsi-soc.2018.8644963
|View full text |Cite
|
Sign up to set email alerts
|

On the Effectiveness of the Satisfiability Attack on Split Manufactured Circuits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…Attacks using proximity information as a metric are not the only solution to recover missing BEOL connections. An effective methodology to apply a Boolean satisfiability based strategy is proposed by Chen et al [22]. The authors claim that their attack methodology does not need (or depend on) any proximity information, or even any other insights into the nature of EDA tools utilized in the design process.…”
Section: Attacks On Split Manufacturingmentioning
confidence: 99%
See 3 more Smart Citations
“…Attacks using proximity information as a metric are not the only solution to recover missing BEOL connections. An effective methodology to apply a Boolean satisfiability based strategy is proposed by Chen et al [22]. The authors claim that their attack methodology does not need (or depend on) any proximity information, or even any other insights into the nature of EDA tools utilized in the design process.…”
Section: Attacks On Split Manufacturingmentioning
confidence: 99%
“…In reality, [22] presents a different interpretation of Threat model I since the attacker is assumed to possess a functional IC. This IC would then have to be available in the open market for the attacker to be able to purchase it.…”
Section: Attacks On Split Manufacturingmentioning
confidence: 99%
See 2 more Smart Citations
“…Another variation of the threat model was explored by Chen and Vemuri [78]. The authors assume that a working chip is available which is then used as an oracle for a SAT-based formulation to recover the missing BEOL connections.…”
Section: Threat Modelmentioning
confidence: 99%