2018 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2018
DOI: 10.23919/date.2018.8342269
|View full text |Cite
|
Sign up to set email alerts
|

Towards provably-secure performance locking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…ObfusGEM integrates logic locked netlists within a cycle-accurate GEM5 model of a processor [71]. By running arbitrary workloads on this model and tracking the divergence between a locked and unlocked processor, the application-level impact of logic locking is quantified [72]. This provides a promising avenue to evaluate logic locking moving forward.…”
Section: Perspectives On Application-level Directionsmentioning
confidence: 99%
“…ObfusGEM integrates logic locked netlists within a cycle-accurate GEM5 model of a processor [71]. By running arbitrary workloads on this model and tracking the divergence between a locked and unlocked processor, the application-level impact of logic locking is quantified [72]. This provides a promising avenue to evaluate logic locking moving forward.…”
Section: Perspectives On Application-level Directionsmentioning
confidence: 99%
“…where (21) represents that the latest arrival time at g i should be stable t su before a rising clock edge. The earliest arrival time s gi should be larger than t h as shown in (22), so that the data can be latched by the flip-flop ff k1 reliably.…”
Section: Wave-pipelining Construction For Timingcamouflage+mentioning
confidence: 99%
“…Furthermore, logic locking can be performed at sequential level to prevent the circuit from entering working states without a valid key [21]. Recently, logic locking has been applied to protect parametric behavior of circuits, e.g., pipelined processors [22], GPUs [23] and analog circuits [24]. The method in [22] adds meaningless clock cycles to camouflage a design, where only correct keys allow a high timing performance.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recent works have proposed parametric locking [30,[39][40][41]; the essence is to lock design parameters and profiles. For example, in [39], the key not only protects the functionality of the design but also its timing profile.…”
Section: Future Directions For Logic Lockingmentioning
confidence: 99%