Skip to main content

Showing 1–4 of 4 results for author: Keshavarz, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:1802.08919  [pdf, other

    cs.CR cs.AR

    Privacy Leakages in Approximate Adders

    Authors: Shahrzad Keshavarz, Daniel Holcomb

    Abstract: Approximate computing has recently emerged as a promising method to meet the low power requirements of digital designs. The erroneous outputs produced in approximate computing can be partially a function of each chip's process variation. We show that, in such schemes, the erroneous outputs produced on each chip instance can reveal the identity of the chip that performed the computation, possibly j… ▽ More

    Submitted 24 February, 2018; originally announced February 2018.

    Comments: 2017 IEEE International Symposium on Circuits and Systems (ISCAS)

  2. arXiv:1802.08916  [pdf, other

    cs.CR

    SAT-based Reverse Engineering of Gate-Level Schematics using Fault Injection and Probing

    Authors: Shahrzad Keshavarz, Falk Schellenberg, Bastian Richter, Christof Paar, Daniel Holcomb

    Abstract: Gate camouflaging is a known security enhancement technique that tries to thwart reverse engineering by hiding the functions of gates or the connections between them. A number of works on SAT-based attacks have shown that it is often possible to reverse engineer a circuit function by combining a camouflaged circuit model and the ability to have oracle access to the obfuscated combinational circuit… ▽ More

    Submitted 24 February, 2018; originally announced February 2018.

    Comments: IEEE International Symposium on Hardware Oriented Security and Trust (HOST)

  3. arXiv:1708.07150  [pdf, other

    cs.CR

    Threshold-based Obfuscated Keys with Quantifiable Security against Invasive Readout

    Authors: Shahrzad Keshavarz, Daniel Holcomb

    Abstract: Advances in reverse engineering make it challenging to deploy any on-chip information in a way that is hidden from a determined attacker. A variety of techniques have been proposed for design obfuscation including look-alike cells in which functionality is determined by hard to observe mechanisms including dummy vias or transistor threshold voltages. Threshold-based obfuscation is especially promi… ▽ More

    Submitted 25 October, 2017; v1 submitted 23 August, 2017; originally announced August 2017.

  4. arXiv:1703.00475  [pdf, other

    cs.CR

    Design Automation for Obfuscated Circuits with Multiple Viable Functions

    Authors: Shahrzad Keshavarz, Christof Paar, Daniel Holcomb

    Abstract: Gate camouflaging is a technique for obfuscating the function of a circuit against reverse engineering attacks. However, if an adversary has pre-existing knowledge about the set of functions that are viable for an application, random camouflaging of gates will not obfuscate the function well. In this case, the adversary can target their search, and only needs to decide whether each of the viable f… ▽ More

    Submitted 1 March, 2017; originally announced March 2017.