Matches in SemOpenAlex for { <https://semopenalex.org/work/W4328007178> ?p ?o ?g. }
Showing items 1 to 68 of
68
with 100 items per page.
- W4328007178 endingPage "1" @default.
- W4328007178 startingPage "1" @default.
- W4328007178 abstract "Logic locking is a well-known solution that thwarts design intellectual property (IP) piracy and prevents illegal overproduction of integrated circuits (ICs) against adversaries in the globalized supply chain. The widespread prevalence of reverse-engineering tools, probing, and fault-injection equipment has given rise to physical attacks that can undermine the security of a locked design. Fault-injection attacks, in particular, can extract the secret key from an oracle, circumventing the defense offered by logic locking. When design IP is compromised through physical attacks, fixing corresponding vulnerabilities generally require a silicon re-spin, which is impractical under constrained time and resources. Thus, there is a requirement for a detection tool that can perform a pre-silicon evaluation of locked designs to notify the designer of any vulnerabilities that can be exploited using faults. In this work, we propose VIGILANT, a first-of-its-kind vulnerability detection tool against fault-injection attacks targeting the hardware implementation of locking techniques. More specifically, VIGILANT aids designers in identifying critical nets susceptible to fault-injection attacks. VIGILANT analyzes the underlying locked design and computes a list of candidate nets along with their fault values required for key leakage and consequently validates each candidate net as vulnerable or not, using a functional simulation model of the design (acting as an oracle). We showcase the efficacy of VIGILANT on different locked designs for four different locking techniques under various parameters such as technology nodes, layout-generation commands, and key-sizes. The accuracy of VIGILANT in identifying and validating all the candidate nets that are vulnerable to fault-injection attacks is 100%" @default.
- W4328007178 created "2023-03-22" @default.
- W4328007178 creator A5005805069 @default.
- W4328007178 creator A5017361496 @default.
- W4328007178 creator A5024862466 @default.
- W4328007178 creator A5052751303 @default.
- W4328007178 creator A5059987567 @default.
- W4328007178 date "2023-01-01" @default.
- W4328007178 modified "2023-09-27" @default.
- W4328007178 title "VIGILANT: Vulnerability Detection Tool against Fault-Injection Attacks for Locking Techniques" @default.
- W4328007178 doi "https://doi.org/10.1109/tcad.2023.3259300" @default.
- W4328007178 hasPublicationYear "2023" @default.
- W4328007178 type Work @default.
- W4328007178 citedByCount "0" @default.
- W4328007178 crossrefType "journal-article" @default.
- W4328007178 hasAuthorship W4328007178A5005805069 @default.
- W4328007178 hasAuthorship W4328007178A5017361496 @default.
- W4328007178 hasAuthorship W4328007178A5024862466 @default.
- W4328007178 hasAuthorship W4328007178A5052751303 @default.
- W4328007178 hasAuthorship W4328007178A5059987567 @default.
- W4328007178 hasConcept C111919701 @default.
- W4328007178 hasConcept C115903868 @default.
- W4328007178 hasConcept C127313418 @default.
- W4328007178 hasConcept C127413603 @default.
- W4328007178 hasConcept C149635348 @default.
- W4328007178 hasConcept C165205528 @default.
- W4328007178 hasConcept C175551986 @default.
- W4328007178 hasConcept C200601418 @default.
- W4328007178 hasConcept C26517878 @default.
- W4328007178 hasConcept C2775928411 @default.
- W4328007178 hasConcept C2777904410 @default.
- W4328007178 hasConcept C38652104 @default.
- W4328007178 hasConcept C41008148 @default.
- W4328007178 hasConcept C55166926 @default.
- W4328007178 hasConcept C95713431 @default.
- W4328007178 hasConceptScore W4328007178C111919701 @default.
- W4328007178 hasConceptScore W4328007178C115903868 @default.
- W4328007178 hasConceptScore W4328007178C127313418 @default.
- W4328007178 hasConceptScore W4328007178C127413603 @default.
- W4328007178 hasConceptScore W4328007178C149635348 @default.
- W4328007178 hasConceptScore W4328007178C165205528 @default.
- W4328007178 hasConceptScore W4328007178C175551986 @default.
- W4328007178 hasConceptScore W4328007178C200601418 @default.
- W4328007178 hasConceptScore W4328007178C26517878 @default.
- W4328007178 hasConceptScore W4328007178C2775928411 @default.
- W4328007178 hasConceptScore W4328007178C2777904410 @default.
- W4328007178 hasConceptScore W4328007178C38652104 @default.
- W4328007178 hasConceptScore W4328007178C41008148 @default.
- W4328007178 hasConceptScore W4328007178C55166926 @default.
- W4328007178 hasConceptScore W4328007178C95713431 @default.
- W4328007178 hasLocation W43280071781 @default.
- W4328007178 hasOpenAccess W4328007178 @default.
- W4328007178 hasPrimaryLocation W43280071781 @default.
- W4328007178 hasRelatedWork W2085688425 @default.
- W4328007178 hasRelatedWork W2106257896 @default.
- W4328007178 hasRelatedWork W2160184218 @default.
- W4328007178 hasRelatedWork W2359378376 @default.
- W4328007178 hasRelatedWork W2382956758 @default.
- W4328007178 hasRelatedWork W2394022650 @default.
- W4328007178 hasRelatedWork W3047024706 @default.
- W4328007178 hasRelatedWork W3161853141 @default.
- W4328007178 hasRelatedWork W4287849810 @default.
- W4328007178 hasRelatedWork W4289655774 @default.
- W4328007178 isParatext "false" @default.
- W4328007178 isRetracted "false" @default.
- W4328007178 workType "article" @default.