Skip to main content

Showing 1–6 of 6 results for author: Roshanisefat, S

.
  1. arXiv:2004.06235  [pdf, other

    cs.CR

    ExTru: A Lightweight, Fast, and Secure Expirable Trust for the Internet of Things

    Authors: Hadi Mardani Kamali, Kimia Zamiri Azar, Shervin Roshanisefat, Ashkan Vakil, Avesta Sasan

    Abstract: The resource-constrained nature of the Internet of Things (IoT) devices, poses a challenge in designing a secure, reliable, and particularly high-performance communication for this family of devices. Although side-channel resistant ciphers (either block cipher or stream cipher) are the well-suited solution to establish a guaranteed secure communication, the energy-intensive nature of these ciphers… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

    Comments: arXiv admin note: text overlap with arXiv:1909.00493

  2. arXiv:2002.07857  [pdf, other

    cs.CR

    DFSSD: Deep Faults and Shallow State Duality, A Provably Strong Obfuscation Solution for Circuits with Restricted Access to Scan Chain

    Authors: Shervin Roshanisefat, Hadi Mardani Kamali, Kimia Zamiri Azar, Sai Manoj Pudukotai Dinakarrao, Naghmeh Karimi, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we introduce DFSSD, a novel logic locking solution for sequential and FSM circuits with a restricted (locked) access to the scan chain. DFSSD combines two techniques for obfuscation: (1) Deep Faults, and (2) Shallow State Duality. Both techniques are specifically designed to resist against sequential SAT attacks based on bounded model checking. The shallow state duality prevents a s… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

  3. SAT-hard Cyclic Logic Obfuscation for Protecting the IP in the Manufacturing Supply Chain

    Authors: Shervin Roshanisefat, Hadi Mardani Kamali, Houman Homayoun, Avesta Sasan

    Abstract: State-of-the-art attacks against cyclic logic obfuscation use satisfiability solvers that are equipped with a set of cycle avoidance clauses. These cycle avoidance clauses are generated in a pre-processing step and define various key combinations that could open or close cycles without making the circuit oscillating or stateful. In this paper, we show that this pre-processing step has to generate… ▽ More

    Submitted 22 January, 2020; originally announced January 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1804.09162

  4. arXiv:1909.00493  [pdf, other

    cs.CR

    COMA: Communication and Obfuscation Management Architecture

    Authors: Kimia Zamiri Azar, Farnoud Farahmand, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan

    Abstract: In this paper, we introduce a novel Communication and Obfuscation Management Architecture (COMA) to handle the storage of the obfuscation key and to secure the communication to/from untrusted yet obfuscated circuits. COMA addresses three challenges related to the obfuscated circuits: First, it removes the need for the storage of the obfuscation unlock key at the untrusted chip. Second, it implemen… ▽ More

    Submitted 1 September, 2019; originally announced September 2019.

  5. arXiv:1805.00054  [pdf, other

    cs.CR

    Benchmarking the Capabilities and Limitations of SAT Solvers in Defeating Obfuscation Schemes

    Authors: Shervin Roshanisefat, Harshith K. Thirumala, Kris Gaj, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we investigate the strength of six different SAT solvers in attacking various obfuscation schemes. Our investigation revealed that Glucose and Lingeling SAT solvers are generally suited for attacking small-to-midsize obfuscated circuits, while the MapleGlucose, if the system is not memory bound, is best suited for attacking mid-to-difficult obfuscation methods. Our experimental resu… ▽ More

    Submitted 30 April, 2018; originally announced May 2018.

  6. SRCLock: SAT-Resistant Cyclic Logic Locking for Protecting the Hardware

    Authors: Shervin Roshanisefat, Hadi Mardani Kamali, Avesta Sasan

    Abstract: In this paper, we claim that cyclic obfuscation, when properly implemented, poses exponential complexity on SAT or CycSAT attack. The CycSAT, in order to generate the necessary cycle avoidance clauses, uses a pre-processing step. We show that this pre-processing step has to compose its cycle avoidance condition on all cycles in a netlist, otherwise, a missing cycle could trap the SAT solver in an… ▽ More

    Submitted 24 April, 2018; originally announced April 2018.