Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Hadi Mardani Kamali"'
Autor:
Md Sami Ul Islam Sami, Tao Zhang, Amit Mazumder Shuvo, Md Saad Ul Haque, Paul E. Calzada, Kimia Zamiri Azar, Hadi Mardani Kamali, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
Publikováno v:
IEEE Access, Vol 12, Pp 48081-48107 (2024)
The semiconductor industry has adopted heterogeneous integration (HI), incorporating modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to overcome the slowdown in Moore’s Law and Dennard scaling and to resp
Externí odkaz:
https://doaj.org/article/e06012ab5b6e46eab6276bb8384472df
Publikováno v:
IEEE Access, Vol 9, Pp 73133-73151 (2021)
The availability of access to Integrated Circuits’ scan chain is an inevitable requirement of modern ICs for testability/debugging purposes. However, leaving access to the scan chain OPEN resulted in numerous security threats on ICs. It raises chal
Externí odkaz:
https://doaj.org/article/427c075500674f4c89e2f2061d6dac31
Autor:
Zhiqian Chen, Lei Zhang, Gaurav Kolhe, Hadi Mardani Kamali, Setareh Rafatirad, Sai Manoj Pudukotai Dinakarrao, Houman Homayoun, Chang-Tien Lu, Liang Zhao
Publikováno v:
Frontiers in Big Data, Vol 4 (2021)
Circuit obfuscation is a recently proposed defense mechanism to protect the intellectual property (IP) of digital integrated circuits (ICs) from reverse engineering. There have been effective schemes, such as satisfiability (SAT)-checking based attac
Externí odkaz:
https://doaj.org/article/62b4404a03924c0f80439ce35087eda3
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 1 (2018)
In this paper, we introduce the Satisfiability Modulo Theory (SMT) attack on obfuscated circuits. The proposed attack is the superset of Satisfiability (SAT) attack, with many additional features. It uses one or more theory solvers in addition to its
Externí odkaz:
https://doaj.org/article/9b3016ce406848c2a6f19021b434d9f9
Publikováno v:
Proceedings of the Great Lakes Symposium on VLSI 2023.
Autor:
Kimia Zamiri Azar, Hadi Mardani Kamali, Houman Homayoun, Christos Sotiriou, Avesta Sasan, Shervin Roshanisefat
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 29:643-656
In this article, unlike almost all state-of-the-art obfuscation solutions that focus on functional/logic obfuscation, we introduce a new paradigm, called data flow obfuscation, which exploits the essence of asynchronicity. In data flow obfuscation, b
Publikováno v:
2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
Publikováno v:
Encyclopedia of Cryptography, Security and Privacy ISBN: 9783642277399
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::558f9c64c6178c871fe602a3f13a2124
https://doi.org/10.1007/978-3-642-27739-9_1655-1
https://doi.org/10.1007/978-3-642-27739-9_1655-1
Autor:
Md Sami Ul Islam Sami, Hadi Mardani Kamali, Farimah Farahmandi, Fahim Rahman, Mark Tehranipoor
Publikováno v:
IEEE Design & Test. :1-1
Publikováno v:
ACM Great Lakes Symposium on VLSI
To enable trust in the IC supply chain, logic locking as an IP protection technique received significant attention in recent years. Over the years, by utilizing Boolean satisfiability (SAT) solver and its derivations, many de-obfuscation attacks have