Jan. 12, 2023, 2:10 a.m. | F. Almeida, L. Aksoy, Q-L. Nguyen, S. Dupuis, M-L. Flottes, S. Pagliarini

cs.CR updates on arXiv.org arxiv.org

Logic locking has been a promising solution to many hardware security
threats, such as intellectual property infringement and overproduction. Due to
the increased attention that threats have received, many efficient specialized
attacks against logic locking have been introduced over the years. However, the
ability of an adversary to manipulate a locked netlist prior to mounting an
attack has not been investigated thoroughly. This paper introduces a
resynthesis-based strategy that utilizes the strength of a commercial
electronic design automation (EDA) tool …

adversary attack attacks attention hardware hardware security intellectual property locked logic security security threats solution strategy strength threats

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Compliance Architect - Experian Health (Can be REMOTE from anywhere in the US)

@ Experian | ., ., United States

IT Security Specialist

@ Ørsted | Kuala Lumpur, MY

Senior, Cyber Security Analyst

@ Peloton | New York City

Cyber Security Engineer | Perimeter | Firewall

@ Garmin Cluj | Cluj-Napoca, Cluj County, Romania

Pentester / Ethical Hacker Web/API - Vast/Freelance

@ Resillion | Brussels, Belgium