ip theft
Recently Published Documents


TOTAL DOCUMENTS

28
(FIVE YEARS 2)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
Brunno F. Goldstein ◽  
Vinay C. Patil ◽  
Victor C. Ferreira ◽  
Alexandre S. Nery ◽  
Felipe M. G. Franca ◽  
...  
Keyword(s):  

2020 ◽  
Author(s):  
Pardis Tabaee Damavandi

Perspective / opinion. A copycat of this IP preprint article has recently appeared on a low quality journal which has accepted and published it, however it is IP theft and it is not legal, nor moral. The journal impact factor is 3 and the journal site is supposedly at Utrecht University in the Netherlands. This is a violation and it should be removed. These series of works were not carried out neither in Algeria, nor in the Netherlands. It does not matter if it is a partial IP theft, until the preprint is not published, other articles cannot be accepted without the citation as that is IP theft. https://www.sciencedirect.com/science/article/pii/S0014299920308517?via%3Dihub


Author(s):  
Nils Albartus ◽  
Max Hoffmann ◽  
Sebastian Temme ◽  
Leonid Azriel ◽  
Christof Paar

Reverse engineering of integrated circuits, i.e., understanding the internals of Integrated Circuits (ICs), is required for many benign and malicious applications. Examples of the former are detection of patent infringements, hardware Trojans or Intellectual Property (IP)-theft, as well as interface recovery and defect analysis, while malicious applications include IP-theft and finding insertion points for hardware Trojans. However, regardless of the application, the reverse engineer initially starts with a large unstructured netlist, forming an incomprehensible sea of gates.This work presents DANA, a generic, technology-agnostic, and fully automated dataflow analysis methodology for flattened gate-level netlists. By analyzing the flow of data between individual Flip Flops (FFs), DANA recovers high-level registers. The key idea behind DANA is to combine independent metrics based on structural and control information with a powerful automated architecture. Notably, DANA works without any thresholds, scenario-dependent parameters, or other “magic” values that the user must choose. We evaluate DANA on nine modern hardware designs, ranging from cryptographic co-processors, over CPUs, to the OpenTitan, a stateof- the-art System-on-Chip (SoC), which is maintained by the lowRISC initiative with supporting industry partners like Google and Western Digital. Our results demonstrate almost perfect recovery of registers for all case studies, regardless whether they were synthesized as FPGA or ASIC netlists. Furthermore, we explore two applications for dataflow analysis: we show that the raw output of DANA often already allows to identify crucial components and high-level architecture features and also demonstrate its applicability for detecting simple hardware Trojans.Hence, DANA can be applied universally as the first step when investigating unknown netlists and provides major guidance for human analysts by structuring and condensing the otherwise incomprehensible sea of gates. Our implementation of DANA and all synthesized netlists are available as open source on GitHub.


2020 ◽  
Vol 25 (1) ◽  
pp. 1-20
Author(s):  
Sukanta Bhattacharjee ◽  
Jack Tang ◽  
Sudip Poddar ◽  
Mohamed Ibrahim ◽  
Ramesh Karri ◽  
...  
Keyword(s):  

Author(s):  
Mohammed Shayan ◽  
Sukanta Bhattacharjee ◽  
Ajymurat Orozaliev ◽  
Yong-Ak Song ◽  
Krishnendu Chakrabarty ◽  
...  
Keyword(s):  

Cryptography ◽  
2019 ◽  
Vol 3 (3) ◽  
pp. 17 ◽  
Author(s):  
Md Shahed Enamul Quadir ◽  
John A. Chandy

As a result of the increased use of contract foundries, internet protocol (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries. Hardware obfuscation and IP locking can be used to make a design secure by replacing a part of the circuit with a key-locked module. In order to ensure each chip has unique keys, previous work has proposed using physical unclonable functions (PUF) to lock the circuit. However, these designs are area intensive. In this work, we propose a strong PUF-based hardware obfuscation scheme to uniquely lock each chip.


Author(s):  
Mohammed Shayan ◽  
Sukanta Bhattacharjee ◽  
Yong-Ak Song ◽  
Krishnendu Chakrabarty ◽  
Ramesh Karri
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document