Reference Articles
We are providing some of the materials relevant to the locking or obfuscation schemes.
For Sequential Obfsucation
-
“You Break I Fix: A Collaborative Approach for Strengthening Sequential Obfuscation of Hardware Intellectual Property” by MM Rahman, T Meade, Y Jin, S Bhunia in Annual Government Microcircuit Applications & Critical Technology (GOMACTech) Conference 2020, CA, USA.
-
“HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection” by RS Chakraborty, S Bhunia in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ( Volume: 28, Issue: 10, Oct. 2009 ).
- https://ieeexplore.ieee.org/document/5247148
- N.B: The implementation strategies used in sequential obfuscation are not identical but similar to this one.
For Combinational Logic Locking
-
“Thwarting All Logic Locking Attacks: Dishonest Oracle with Truly Random Logic Locking” by N Limaye, E Kalligeros, N Karousos, I G Karybali and O Sinanoglu in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (Early Access).
-
“Scalable Attack-Resistant Obfuscation of Logic Circuits” by A Alaql, S Bhunia in arxiv.