Reference Articles
(will be updated with additional materials)
We are providing some of the materials relevant to the locking or obfuscation schemes.
For Logic Locking
-
“Provbly-Secure Logic Locking: From Theory To Practice,” by M. Yasin, A. Sengupta, M. Nabeel, M. Ashraf, J. Rajendran, O. Sinanoglu in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.
-
“Does logic locking work with EDA tools?” by Z. Han, M. Yasin and J. Rajendran in 2021 USENIX Security Conference.
For State Space Obfuscation
-
“HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection,” by R. Chakraborty and S. Bhunia in 2009 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
-
N.B: The implementation strategies used in sequential obfuscation are not identical but similar to this one.
-
“Practical Implementation of Robust State Space Obfuscation for Hardware IP Protection,” by M. Rahman and S. Bhunia.
For Fine-grain Hardware Redaction
-
“LUT-Lock: A Novel LUT-Based Logic Obfuscation for FPGA-Bitstream and ASIC-Hardware Protection,” by H. Mardani Kamali, K. Zamiri Azar, K. Gaj, H. Homayoun and A. Sasan in 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
-
“Hardware Redaction via Designer-Directed Fine-Grained eFPGA Insertion,” by P. Mohan, O. Atli, J. Sweeney, O. Kibar, L. Pileggi and K. Mai in 2021 IEEE Design, Automation & Test in Europe Conference & Exhibition (DATE).