BeSAT: behavioral SAT-based attack on cyclic logic encryption
- Yuanqi Shen, You Li, Amin Rezaei, Shuyu Kong, David Dlott, H. Zhou
- Computer Science, MathematicsAsia and South Pacific Design Automation…
- 21 January 2019
This paper proposes a behavioral SAT-based attack called BeSAT, which observes the behavior of the encrypted circuit on top of the structural analysis, so the stateful and oscillatory keys missed by CycSAT can still be blocked.
Cyclic locking and memristor-based obfuscation against CycSAT and inside foundry attacks
- Amin Rezaei, Yuanqi Shen, Shuyu Kong, Jie Gu, H. Zhou
- Computer ScienceDesign, Automation and Test in Europe
- 19 April 2018
The robustness against state-of-the-art key-pruning attacks is demonstrated, the overhead of the polymorphic gates is investigated, and a comprehensive chip protection method based on cyclic locking and polymorphic memristor-CMOS obfuscation is proposed.
CycSAT-unresolvable cyclic logic encryption using unreachable states
- Amin Rezaei, You Li, Yuanqi Shen, Shuyu Kong, H. Zhou
- Computer Science, MathematicsAsia and South Pacific Design Automation…
- 21 January 2019
This work develops a new way of cyclic encryption by utilizing unreachable states to defeat CycSAT, and finds that cyclic logic encryption can utilize unreachable states to improve security.
SAT-based bit-flipping attack on logic encryptions
- Yuanqi Shen, Amin Rezaei, H. Zhou
- Computer Science, MathematicsDesign, Automation and Test in Europe
- 19 March 2018
The experimental results show that the SAT-based bit-flipping attack successfully returns a circuit with the correct functionality and significantly reduces the execution time compared with other advanced attacks.
Rescuing Logic Encryption in Post-SAT Era by Locking & Obfuscation
- Amin Rezaei, Yuanqi Shen, H. Zhou
- Computer ScienceDesign, Automation and Test in Europe
- 1 March 2020
A bilateral logic encryption platform that maintains high degree of security with small circuit modification and the robustness against exact and approximate attacks is demonstrated.
Efficient Congestion-Aware Scheme for Wireless on-Chip Networks
- Amin Rezaei, M. Daneshtalab, M. Palesi, Danella Zhao
- Computer Science, BusinessInternational Euromicro Conference on Parallel…
- 1 February 2016
A congestion-aware platform (CAP-W) is introduced for wireless NoCs in order to reduce both internal and external congestions, and simulation results show significant gain in congestion control over PEs of wireless NoC, compared to state-of-the-art works.
Multi-objective Task Mapping Approach for Wireless NoC in Dark Silicon Age
- Amin Rezaei, Dan Zhao, M. Daneshtalab, H. Zhou
- Computer ScienceInternational Euromicro Conference on Parallel…
- 6 March 2017
A novel task mapping approach for HWNoC is introduced in order to first balance the usage of wireless links by avoiding congestion over wireless routers and second spread temperature across the whole chip by utilizing dark silicon.
A comparative investigation of approximate attacks on logic encryptions
- Yuanqi Shen, Amin Rezaei, H. Zhou
- Computer ScienceAsia and South Pacific Design Automation…
- 22 January 2018
A suite of scientific encryption benchmarks where a wide range of error rates are possible and the error rate can be found out by simple eyeballing is developed and a thorough comparative study on different approximate attacks is conducted.
Dynamic Application Mapping Algorithm for Wireless Network-on-Chip
- Amin Rezaei, M. Daneshtalab, Danella Zhao, F. Safaei, Xiaohang Wang, M. Ebrahimi
- Computer Science23rd Euromicro International Conference on…
- 1 March 2015
A Dynamic Application Mapping Algorithm (DAMA) is introduced for wireless NoCs in order to reduce both internal and external congestion and shows significant gain in the mapping cost functions compared to state-of-the-art works.
Hybrid Memristor-CMOS Obfuscation Against Untrusted Foundries
- Amin Rezaei, J. Gu, H. Zhou
- Computer ScienceIEEE Computer Society Annual Symposium on VLSI
- 1 July 2019
This paper proposes a hardware obfuscation method based on polymorphic hybrid memristor-CMOS technology, which makes it impossible even for an inside foundry attacker to distinguish the defined functionality of an IC by looking at its layout.
...
...