Skip to main content

Showing 1–4 of 4 results for author: Gaj, K

.
  1. arXiv:1909.00493  [pdf, other

    cs.CR

    COMA: Communication and Obfuscation Management Architecture

    Authors: Kimia Zamiri Azar, Farnoud Farahmand, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan

    Abstract: In this paper, we introduce a novel Communication and Obfuscation Management Architecture (COMA) to handle the storage of the obfuscation key and to secure the communication to/from untrusted yet obfuscated circuits. COMA addresses three challenges related to the obfuscated circuits: First, it removes the need for the storage of the obfuscation unlock key at the untrusted chip. Second, it implemen… ▽ More

    Submitted 1 September, 2019; originally announced September 2019.

  2. arXiv:1805.00054  [pdf, other

    cs.CR

    Benchmarking the Capabilities and Limitations of SAT Solvers in Defeating Obfuscation Schemes

    Authors: Shervin Roshanisefat, Harshith K. Thirumala, Kris Gaj, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we investigate the strength of six different SAT solvers in attacking various obfuscation schemes. Our investigation revealed that Glucose and Lingeling SAT solvers are generally suited for attacking small-to-midsize obfuscated circuits, while the MapleGlucose, if the system is not memory bound, is best suited for attacking mid-to-difficult obfuscation methods. Our experimental resu… ▽ More

    Submitted 30 April, 2018; originally announced May 2018.

  3. arXiv:1804.11275  [pdf, other

    cs.CR

    LUT-Lock: A Novel LUT-based Logic Obfuscation for FPGA-Bitstream and ASIC-Hardware Protection

    Authors: Hadi Mardani Kamali, Kimia Zamiri Azar, Kris Gaj, Houman Homayoun, Avesta Sasan

    Abstract: In this work, we propose LUT-Lock, a novel Look-Up-Table-based netlist obfuscation algorithm, for protecting the intellectual property that is mapped to an FPGA bitstream or an ASIC netlist. We, first, illustrate the effectiveness of several key features that make the LUT-based obfuscation more resilient against SAT attacks and then we embed the proposed key features into our proposed LUT-Lock alg… ▽ More

    Submitted 10 May, 2018; v1 submitted 30 April, 2018; originally announced April 2018.

  4. arXiv:1506.02071  [pdf

    cs.MM cs.CR

    Using Facebook for Image Steganography

    Authors: Jason Hiney, Tejas Dakve, Krzysztof Szczypiorski, Kris Gaj

    Abstract: Because Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held devices running iOS, Android, or Windows Phone), it would seem to be the perfect place to conduct steganography. On Facebook, information hidden in ima… ▽ More

    Submitted 5 June, 2015; originally announced June 2015.

    Comments: 6 pages, 4 figures, 2 tables. Accepted to Fourth International Workshop on Cyber Crime (IWCC 2015), co-located with 10th International Conference on Availability, Reliability and Security (ARES 2015), Toulouse, France, 24-28 August 2015