Reference Articles
(will be updated with additional materials)
We are providing some of the materials relevant to the locking or obfuscation schemes.
For Sequential Obfsucation
“You Break I Fix: A Collaborative Approach for Strengthening Sequential Obfuscation of Hardware Intellectual Property” by MM Rahman, T Meade, Y Jin, S Bhunia in Annual Government Microcircuit Applications & Critical Technology (GOMACTech) Conference 2020, CA, USA.
“HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection” by RS Chakraborty, S Bhunia in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ( Volume: 28, Issue: 10, Oct. 2009 ).
- https://ieeexplore.ieee.org/document/5247148
- N.B: The implementation strategies used in sequential obfuscation are not identical but similar to this one.
For Combinational Logic Locking
“Provably-Secure Logic Locking: From Theory To Practice” by M Yasin, A Sengupta, M Nabeel, M Ashraf, J Rajendran, O Sinanoglu in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1601-1618. 2017.