Skip to main content

Showing 1–33 of 33 results for author: Homayoun, H

.
  1. arXiv:2405.12443  [pdf, other

    cs.LG

    FFCL: Forward-Forward Net with Cortical Loops, Training and Inference on Edge Without Backpropagation

    Authors: Ali Karkehabadi, Houman Homayoun, Avesta Sasan

    Abstract: The Forward-Forward Learning (FFL) algorithm is a recently proposed solution for training neural networks without needing memory-intensive backpropagation. During training, labels accompany input data, classifying them as positive or negative inputs. Each layer learns its response to these inputs independently. In this study, we enhance the FFL with the following contributions: 1) We optimize labe… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

    Comments: Accepted at the Great Lakes Symposium on VLSI 2024

  2. arXiv:2405.12197  [pdf

    cs.CR

    Automated Hardware Logic Obfuscation Framework Using GPT

    Authors: Banafsheh Saber Latibari, Sujan Ghimire, Muhtasim Alam Chowdhury, Najmeh Nazari, Kevin Immanuel Gubbi, Houman Homayoun, Avesta Sasan, Soheil Salehi

    Abstract: Obfuscation stands as a promising solution for safeguarding hardware intellectual property (IP) against a spectrum of threats including reverse engineering, IP piracy, and tampering. In this paper, we introduce Obfus-chat, a novel framework leveraging Generative Pre-trained Transformer (GPT) models to automate the obfuscation process. The proposed framework accepts hardware design netlists and key… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

  3. arXiv:2404.02344  [pdf, other

    cs.CR cs.CV

    Generative AI-Based Effective Malware Detection for Embedded Computing Systems

    Authors: Sreenitha Kasarapu, Sanket Shukla, Rakibul Hassan, Avesta Sasan, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao

    Abstract: One of the pivotal security threats for the embedded computing systems is malicious software a.k.a malware. With efficiency and efficacy, Machine Learning (ML) has been widely adopted for malware detection in recent times. Despite being efficient, the existing techniques require a tremendous number of benign and malware samples for training and modeling an efficient malware detector. Furthermore,… ▽ More

    Submitted 12 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

  4. arXiv:2403.03897  [pdf, other

    cs.SE cs.CR

    Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing

    Authors: Asmita, Yaroslav Oliinyk, Michael Scott, Ryan Tsang, Chongzhou Fang, Houman Homayoun

    Abstract: BusyBox, an open-source software bundling over 300 essential Linux commands into a single executable, is ubiquitous in Linux-based embedded devices. Vulnerabilities in BusyBox can have far-reaching consequences, affecting a wide array of devices. This research, driven by the extensive use of BusyBox, delved into its analysis. The study revealed the prevalence of older BusyBox versions in real-worl… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

  5. arXiv:2312.13530  [pdf, other

    cs.CR cs.AI cs.LG

    HW-V2W-Map: Hardware Vulnerability to Weakness Map** Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion

    Authors: Yu-Zheng Lin, Muntasir Mamun, Muhtasim Alam Chowdhury, Shuyu Cai, Mingyu Zhu, Banafsheh Saber Latibari, Kevin Immanuel Gubbi, Najmeh Nazari Bavarsad, Arjun Caputo, Avesta Sasan, Houman Homayoun, Setareh Rafatirad, Pratik Satam, Soheil Salehi

    Abstract: The escalating complexity of modern computing frameworks has resulted in a surge in the cybersecurity vulnerabilities reported to the National Vulnerability Database (NVD) by practitioners. Despite the fact that the stature of NVD is one of the most significant databases for the latest insights into vulnerabilities, extracting meaningful trends from such a large amount of unstructured data is stil… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

    Comments: 22 pages, 10 pages appendix, 10 figures, Submitted to ACM TODAES

  6. arXiv:2310.12357  [pdf, other

    cs.SE cs.CR

    Large Language Models for Code Analysis: Do LLMs Really Do Their Job?

    Authors: Chongzhou Fang, Ning Miao, Shaurya Srivastav, Jialin Liu, Ruoyu Zhang, Ruijie Fang, Asmita, Ryan Tsang, Najmeh Nazari, Han Wang, Houman Homayoun

    Abstract: Large language models (LLMs) have demonstrated significant potential in the realm of natural language understanding and programming code processing tasks. Their capacity to comprehend and generate human-like code has spurred research into harnessing LLMs for code analysis purposes. However, the existing body of literature falls short in delivering a systematic evaluation and assessment of LLMs' ef… ▽ More

    Submitted 5 March, 2024; v1 submitted 18 October, 2023; originally announced October 2023.

    Comments: Accepted by Usenix Security 2024

  7. arXiv:2310.00772  [pdf, other

    cs.CV

    SMOOT: Saliency Guided Mask Optimized Online Training

    Authors: Ali Karkehabadi, Houman Homayoun, Avesta Sasan

    Abstract: Deep Neural Networks are powerful tools for understanding complex patterns and making decisions. However, their black-box nature impedes a complete understanding of their inner workings. Saliency-Guided Training (SGT) methods try to highlight the prominent features in the model's training based on the output to alleviate this problem. These methods use back-propagation and modified gradients to gu… ▽ More

    Submitted 10 October, 2023; v1 submitted 1 October, 2023; originally announced October 2023.

  8. Gotcha! I Know What You are Doing on the FPGA Cloud: Fingerprinting Co-Located Cloud FPGA Accelerators via Measuring Communication Links

    Authors: Chongzhou Fang, Ning Miao, Han Wang, Jiacheng Zhou, Tyler Sheaves, John M. Emmert, Avesta Sasan, Houman Homayoun

    Abstract: In recent decades, due to the emerging requirements of computation acceleration, cloud FPGAs have become popular in public clouds. Major cloud service providers, e.g. AWS and Microsoft Azure have provided FPGA computing resources in their infrastructure and have enabled users to design and deploy their own accelerators on these FPGAs. Multi-tenancy FPGAs, where multiple users can share the same FP… ▽ More

    Submitted 7 July, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

    Comments: To be published in ACM CCS 2023

  9. arXiv:2304.01990  [pdf, other

    cs.CR cs.LG eess.SP

    Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification

    Authors: Jialin Liu, Ning Miao, Chongzhou Fang, Houman Homayoun, Han Wang

    Abstract: The Electrocardiogram (ECG) measures the electrical cardiac activity generated by the heart to detect abnormal heartbeat and heart attack. However, the irregular occurrence of the abnormalities demands continuous monitoring of heartbeats. Machine learning techniques are leveraged to automate the task to reduce labor work needed during monitoring. In recent years, many companies have launched produ… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

  10. A Neural Network-based SAT-Resilient Obfuscation Towards Enhanced Logic Locking

    Authors: Rakibul Hassan, Gaurav Kolhe, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao

    Abstract: Logic obfuscation is introduced as a pivotal defense against multiple hardware threats on Integrated Circuits (ICs), including reverse engineering (RE) and intellectual property (IP) theft. The effectiveness of logic obfuscation is challenged by the recently introduced Boolean satisfiability (SAT) attack and its variants. A plethora of countermeasures has also been proposed to thwart the SAT attac… ▽ More

    Submitted 13 September, 2022; originally announced September 2022.

    Journal ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ( Early Access ) 2021 1-1

  11. arXiv:2204.03694  [pdf, other

    cs.LG cs.CV

    Adaptive-Gravity: A Defense Against Adversarial Samples

    Authors: Ali Mirzaeian, Zhi Tian, Sai Manoj P D, Banafsheh S. Latibari, Ioannis Savidis, Houman Homayoun, Avesta Sasan

    Abstract: This paper presents a novel model training solution, denoted as Adaptive-Gravity, for enhancing the robustness of deep neural network classifiers against adversarial examples. We conceptualize the model parameters/features associated with each class as a mass characterized by its centroid location and the spread (standard deviation of the distance) of features around the centroid. We use the centr… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

  12. Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks

    Authors: Chongzhou Fang, Han Wang, Najmeh Nazari, Behnam Omidi, Avesta Sasan, Khaled N. Khasawneh, Setareh Rafatirad, Houman Homayoun

    Abstract: Cloud computing paradigms have emerged as a major facility to store and process the massive data produced by various business units, public organizations, Internet-of-Things, and cyber-physical systems. To meet users' performance requirements while maximizing resource utilization to achieve cost-efficiency, cloud administrators leverage schedulers to orchestrate tasks to different physical nodes a… ▽ More

    Submitted 15 November, 2021; v1 submitted 2 October, 2021; originally announced October 2021.

  13. arXiv:2009.02208  [pdf, other

    cs.CR

    NNgSAT: Neural Network guided SAT Attack on Logic Locked Complex Structures

    Authors: Kimia Zamiri Azar, Hadi Mardani Kamali, Houman Homayoun, Avesta Sasan

    Abstract: The globalization of the IC supply chain has raised many security threats, especially when untrusted parties are involved. This has created a demand for a dependable logic obfuscation solution to combat these threats. Amongst a wide range of threats and countermeasures on logic obfuscation in the 2010s decade, the Boolean satisfiability (SAT) attack, or one of its derivatives, could break almost a… ▽ More

    Submitted 4 September, 2020; originally announced September 2020.

  14. arXiv:2009.02206  [pdf, other

    cs.CR

    InterLock: An Intercorrelated Logic and Routing Locking

    Authors: Hadi Mardani Kamali, Kimia Zamiri Azar, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we propose a canonical prune-and-SAT (CP&SAT) attack for breaking state-of-the-art routing-based obfuscation techniques. In the CP&SAT attack, we first encode the key-programmable routing blocks (keyRBs) based on an efficient SAT encoding mechanism suited for detailed routing constraints, and then efficiently re-encode and reduce the CNF corresponded to the keyRB using a bounded var… ▽ More

    Submitted 4 September, 2020; originally announced September 2020.

  15. arXiv:2006.15799  [pdf, other

    cs.LG stat.ML

    Conditional Classification: A Solution for Computational Energy Reduction

    Authors: Ali Mirzaeian, Sai Manoj, Ashkan Vakil, Houman Homayoun, Avesta Sasan

    Abstract: Deep convolutional neural networks have shown high efficiency in computer visions and other applications. However, with the increase in the depth of the networks, the computational complexity is growing exponentially. In this paper, we propose a novel solution to reduce the computational complexity of convolutional neural network models used for many class image classification. Our proposed techni… ▽ More

    Submitted 7 January, 2021; v1 submitted 28 June, 2020; originally announced June 2020.

    Comments: paper need to be majorly revised

  16. arXiv:2006.15127  [pdf, other

    eess.IV cs.LG

    Diverse Knowledge Distillation (DKD): A Solution for Improving The Robustness of Ensemble Models Against Adversarial Attacks

    Authors: Ali Mirzaeian, Jana Kosecka, Houman Homayoun, Tinoosh Mohsenin, Avesta Sasan

    Abstract: This paper proposes an ensemble learning model that is resistant to adversarial attacks. To build resilience, we introduced a training process where each member learns a radically distinct latent space. Member models are added one at a time to the ensemble. Simultaneously, the loss function is regulated by a reverse knowledge distillation, forcing the new member to learn different features and map… ▽ More

    Submitted 7 January, 2021; v1 submitted 26 June, 2020; originally announced June 2020.

  17. arXiv:2005.11789  [pdf, other

    cs.CR

    SCRAMBLE: The State, Connectivity and Routing Augmentation Model for Building Logic Encryption

    Authors: Hadi Mardani Kamali, Kimia Zamiri Azar, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we introduce SCRAMBLE, as a novel logic locking solution for sequential circuits while the access to the scan chain is restricted. The SCRAMBLE could be used to lock an FSM by hiding its state transition graph (STG) among a large number of key-controlled false transitions. Also, it could be used to lock sequential circuits (sequential datapath) by hiding the timing paths' connectivi… ▽ More

    Submitted 24 May, 2020; originally announced May 2020.

  18. arXiv:2005.04262  [pdf, other

    cs.CR

    On Designing Secure and Robust Scan Chain for Protecting Obfuscated Logic

    Authors: Hadi Mardani Kamali, Kimia Zamiri Azar, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we assess the security and testability of the state-of-the-art design-for-security (DFS) architectures in the presence of scan-chain locking/obfuscation, a group of solution that has previously proposed to restrict unauthorized access to the scan chain. We discuss the key leakage vulnerability in the recently published prior-art DFS architectures. This leakage relies on the potentia… ▽ More

    Submitted 8 May, 2020; originally announced May 2020.

  19. arXiv:2003.09945  [pdf, other

    cs.LG cs.SI stat.ML

    Deep Multi-attributed Graph Translation with Node-Edge Co-evolution

    Authors: Xiaojie Guo, Liang Zhao, Cameron Nowzari, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao

    Abstract: Generalized from image and language translation, graph translation aims to generate a graph in the target domain by conditioning an input graph in the source domain. This promising topic has attracted fast-increasing attention recently. Existing works are limited to either merely predicting the node attributes of graphs with fixed topology or predicting only the graph topology without considering… ▽ More

    Submitted 15 June, 2020; v1 submitted 22 March, 2020; originally announced March 2020.

    Comments: This paper has won the Best Paper Award in International Conference on Data Mining (ICDM), Bei**g, China, 2019

    Journal ref: International Conference on Data Mining (ICDM), Bei**g, China, 2019, pp. 250-259

  20. arXiv:2002.07857  [pdf, other

    cs.CR

    DFSSD: Deep Faults and Shallow State Duality, A Provably Strong Obfuscation Solution for Circuits with Restricted Access to Scan Chain

    Authors: Shervin Roshanisefat, Hadi Mardani Kamali, Kimia Zamiri Azar, Sai Manoj Pudukotai Dinakarrao, Naghmeh Karimi, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we introduce DFSSD, a novel logic locking solution for sequential and FSM circuits with a restricted (locked) access to the scan chain. DFSSD combines two techniques for obfuscation: (1) Deep Faults, and (2) Shallow State Duality. Both techniques are specifically designed to resist against sequential SAT attacks based on bounded model checking. The shallow state duality prevents a s… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

  21. SAT-hard Cyclic Logic Obfuscation for Protecting the IP in the Manufacturing Supply Chain

    Authors: Shervin Roshanisefat, Hadi Mardani Kamali, Houman Homayoun, Avesta Sasan

    Abstract: State-of-the-art attacks against cyclic logic obfuscation use satisfiability solvers that are equipped with a set of cycle avoidance clauses. These cycle avoidance clauses are generated in a pre-processing step and define various key combinations that could open or close cycles without making the circuit oscillating or stateful. In this paper, we show that this pre-processing step has to generate… ▽ More

    Submitted 22 January, 2020; originally announced January 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1804.09162

  22. arXiv:2001.06476  [pdf, other

    cs.CR

    LASCA: Learning Assisted Side Channel Delay Analysis for Hardware Trojan Detection

    Authors: Ashkan Vakil, Farnaz Behnia, Ali Mirzaeian, Houman Homayoun, Naghmeh Karimi, Avesta Sasan

    Abstract: In this paper, we introduce a Learning Assisted Side Channel delay Analysis (LASCA) methodology for Hardware Trojan detection. Our proposed solution, unlike the prior art, does not require a Golden IC. Instead, it trains a Neural Network to act as a process tracking watchdog for correlating the static timing data (produced at design time) to the delay information obtained from clock frequency swee… ▽ More

    Submitted 17 January, 2020; originally announced January 2020.

  23. arXiv:2001.06099  [pdf, other

    cs.LG cs.CV stat.ML

    Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks

    Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we propose Code-Bridged Classifier (CBC), a framework for making a Convolutional Neural Network (CNNs) robust against adversarial attacks without increasing or even by decreasing the overall models' computational complexity. More specifically, we propose a stacked encoder-convolutional model, in which the input image is first encoded by the encoder module of a denoising auto-encoder… ▽ More

    Submitted 16 January, 2020; originally announced January 2020.

    Comments: 6 pages, Accepted and to appear in ISQED 2020

  24. arXiv:1910.06458  [pdf, other

    cs.PF cs.LG cs.NE

    TCD-NPE: A Re-configurable and Efficient Neural Processing Engine, Powered by Novel Temporal-Carry-deferring MACs

    Authors: Ali Mirzaeian, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we first propose the design of Temporal-Carry-deferring MAC (TCD-MAC) and illustrate how our proposed solution can gain significant energy and performance benefit when utilized to process a stream of input data. We then propose using the TCD-MAC to build a reconfigurable, high speed, and low power Neural Processing Engine (TCD-NPE). We, further, propose a novel scheduler that lists… ▽ More

    Submitted 14 October, 2019; originally announced October 2019.

  25. arXiv:1910.00700  [pdf, other

    cs.LG stat.ML

    NESTA: Hamming Weight Compression-Based Neural Proc. Engine

    Authors: Ali Mirzaeian, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we present NESTA, a specialized Neural engine that significantly accelerates the computation of convolution layers in a deep convolutional neural network, while reducing the computational energy. NESTA reformats Convolutions into $3 \times 3$ batches and uses a hierarchy of Hamming Weight Compressors to process each batch. Besides, when processing the convolution across multiple cha… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

  26. arXiv:1909.00493  [pdf, other

    cs.CR

    COMA: Communication and Obfuscation Management Architecture

    Authors: Kimia Zamiri Azar, Farnoud Farahmand, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan

    Abstract: In this paper, we introduce a novel Communication and Obfuscation Management Architecture (COMA) to handle the storage of the obfuscation key and to secure the communication to/from untrusted yet obfuscated circuits. COMA addresses three challenges related to the obfuscated circuits: First, it removes the need for the storage of the obfuscation unlock key at the untrusted chip. Second, it implemen… ▽ More

    Submitted 1 September, 2019; originally announced September 2019.

  27. arXiv:1908.08497  [pdf, other

    cs.LG stat.ML

    DynGraph2Seq: Dynamic-Graph-to-Sequence Interpretable Learning for Health Stage Prediction in Online Health Forums

    Authors: Yuyang Gao, Lingfei Wu, Houman Homayoun, Liang Zhao

    Abstract: Online health communities such as the online breast cancer forum enable patients (i.e., users) to interact and help each other within various subforums, which are subsections of the main forum devoted to specific health topics. The changing nature of the users' activities in different subforums can be strong indicators of their health status changes. This additional information could allow health-… ▽ More

    Submitted 22 August, 2019; originally announced August 2019.

    Comments: 6 pages. Accepted as ICDM 2019 Short Paper. Final Version

  28. arXiv:1907.12952  [pdf, other

    cs.AR cs.LG

    Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design

    Authors: Hosein Mohammadi Makrani, Farnoud Farahmand, Hossein Sayadi, Sara Bondi, Sai Manoj Pudukotai Dinakarrao, Liang Zhao, Avesta Sasan, Houman Homayoun, Setareh Rafatirad

    Abstract: The emergence of High-Level Synthesis (HLS) tools shifted the paradigm of hardware design by making the process of map** high-level programming languages to hardware design such as C to VHDL/Verilog feasible. HLS tools offer a plethora of techniques to optimize designs for both area and performance, but resource usage and timing reports of HLS tools mostly deviate from the post-implementation re… ▽ More

    Submitted 28 July, 2019; originally announced July 2019.

    Comments: This paper has been accepted in The International Conference on Field-Programmable Logic and Applications 2019 (FPL'19)

  29. arXiv:1907.03250  [pdf, other

    cs.LG

    Resource-Efficient Wearable Computing for Real-Time Reconfigurable Machine Learning: A Cascading Binary Classification

    Authors: Mahdi Pedram, Seyed Ali Rokni, Marjan Nourollahi, Houman Homayoun, Hassan Ghasemzadeh

    Abstract: Advances in embedded systems have enabled integration of many lightweight sensory devices within our daily life. In particular, this trend has given rise to continuous expansion of wearable sensors in a broad range of applications from health and fitness monitoring to social networking and military surveillance. Wearables leverage machine learning techniques to profile behavioral routine of their… ▽ More

    Submitted 7 July, 2019; originally announced July 2019.

    Journal ref: The 16th IEEE International Conference on Wearable and Implantable Body Sensor Networks, 19-22 May, 2019

  30. arXiv:1905.05896  [pdf, other

    cs.CR

    Threats on Logic Locking: A Decade Later

    Authors: Kimia Zamiri Azar, Hadi Mardani Kamali, Houman Homayoun, Avesta Sasan

    Abstract: To reduce the cost of ICs and to meet the market's demand, a considerable portion of manufacturing supply chain, including silicon fabrication, packaging and testing may be pushed offshore. Utilizing a global IC manufacturing supply chain, and inclusion of non-trusted parties in the supply chain has raised concerns over security and trust related challenges including those of overproduction, count… ▽ More

    Submitted 14 May, 2019; originally announced May 2019.

  31. arXiv:1902.05357  [pdf, other

    cs.CR cs.AI cs.CG cs.LG

    Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning

    Authors: Zhiqian Chen, Gaurav Kolhe, Setareh Rafatirad, Sai Manoj P. D., Houman Homayoun, Liang Zhao, Chang-Tien Lu

    Abstract: Circuit obfuscation is a recently proposed defense mechanism to protect digital integrated circuits (ICs) from reverse engineering by using camouflaged gates i.e., logic gates whose functionality cannot be precisely determined by the attacker. There have been effective schemes such as satisfiability-checking (SAT)-based attacks that can potentially decrypt obfuscated circuits, called deobfuscation… ▽ More

    Submitted 21 March, 2020; v1 submitted 14 February, 2019; originally announced February 2019.

    Comments: Design, Automation and Test in Europe (DATE) 2020

  32. arXiv:1805.00054  [pdf, other

    cs.CR

    Benchmarking the Capabilities and Limitations of SAT Solvers in Defeating Obfuscation Schemes

    Authors: Shervin Roshanisefat, Harshith K. Thirumala, Kris Gaj, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we investigate the strength of six different SAT solvers in attacking various obfuscation schemes. Our investigation revealed that Glucose and Lingeling SAT solvers are generally suited for attacking small-to-midsize obfuscated circuits, while the MapleGlucose, if the system is not memory bound, is best suited for attacking mid-to-difficult obfuscation methods. Our experimental resu… ▽ More

    Submitted 30 April, 2018; originally announced May 2018.

  33. arXiv:1804.11275  [pdf, other

    cs.CR

    LUT-Lock: A Novel LUT-based Logic Obfuscation for FPGA-Bitstream and ASIC-Hardware Protection

    Authors: Hadi Mardani Kamali, Kimia Zamiri Azar, Kris Gaj, Houman Homayoun, Avesta Sasan

    Abstract: In this work, we propose LUT-Lock, a novel Look-Up-Table-based netlist obfuscation algorithm, for protecting the intellectual property that is mapped to an FPGA bitstream or an ASIC netlist. We, first, illustrate the effectiveness of several key features that make the LUT-based obfuscation more resilient against SAT attacks and then we embed the proposed key features into our proposed LUT-Lock alg… ▽ More

    Submitted 10 May, 2018; v1 submitted 30 April, 2018; originally announced April 2018.