{"id":98,"date":"2023-11-06T00:01:11","date_gmt":"2023-11-06T05:01:11","guid":{"rendered":"https:\/\/www.ece.ucf.edu\/~kamali\/?page_id=98"},"modified":"2025-09-27T11:25:06","modified_gmt":"2025-09-27T15:25:06","slug":"publications","status":"publish","type":"page","link":"https:\/\/www.ece.ucf.edu\/~kamali\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<div class=\"wp-block-cover nfd-py-lg nfd-px-base has-white-color has-text-color has-link-color wp-elements-a8ebebc69484f704426c750374f42717\" style=\"margin-top:0;margin-bottom:0;padding-top:0;padding-bottom:0;min-height:296px;aspect-ratio:unset;\"><img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"500\" class=\"wp-block-cover__image-background wp-image-475\" alt=\"\" src=\"https:\/\/www.ece.ucf.edu\/~kamali\/wp-content\/uploads\/2024\/01\/warning_back.jpg\" style=\"object-position:53% 100%\" data-object-fit=\"cover\" data-object-position=\"53% 100%\" srcset=\"https:\/\/www.ece.ucf.edu\/~kamali\/wp-content\/uploads\/2024\/01\/warning_back.jpg 800w, https:\/\/www.ece.ucf.edu\/~kamali\/wp-content\/uploads\/2024\/01\/warning_back-300x188.jpg 300w, https:\/\/www.ece.ucf.edu\/~kamali\/wp-content\/uploads\/2024\/01\/warning_back-768x480.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-black-background-color has-background-dim-60 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group alignwide nfd-container\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group nfd-text-md nfd-text-opacity-80\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"has-text-align-left has-roboto-slab-font-family\" style=\"font-size:16px\"><strong><span style=\"text-decoration: underline;\">WARNING<\/span><\/strong>: This directory contains pdf\/ps files of articles that may be <em><strong>covered by copyright<\/strong><\/em>. You may browse the articles at your convenience, in the same spirit as you may read a journal or a proceedings article in a public library. Retrieving, copying, or distributing these files may violate copyright protection laws.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-94195712 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50);padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<figure class=\"wp-block-image size-full is-resized is-style-rounded wp-duotone-fcb900-fcb900-1\"><img decoding=\"async\" width=\"511\" height=\"512\" src=\"https:\/\/www.ece.ucf.edu\/~kamali\/wp-content\/uploads\/2024\/01\/gscholar.png\" alt=\"\" class=\"wp-image-476\" style=\"aspect-ratio:0.998046875;width:66px;height:auto\" srcset=\"https:\/\/www.ece.ucf.edu\/~kamali\/wp-content\/uploads\/2024\/01\/gscholar.png 511w, https:\/\/www.ece.ucf.edu\/~kamali\/wp-content\/uploads\/2024\/01\/gscholar-300x300.png 300w, https:\/\/www.ece.ucf.edu\/~kamali\/wp-content\/uploads\/2024\/01\/gscholar-150x150.png 150w\" sizes=\"(max-width: 511px) 100vw, 511px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:95%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px\">You can find the latest updates of publications here in <a href=\"https:\/\/scholar.google.com\/citations?user=7UADX2MAAAAJ\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\"><strong>Google Scholar Profile<\/strong><\/mark><\/a>!<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull nfd-container nfd-my-0 nfd-p-lg nfd-bg-gray-100 has-black-color has-base-background-color has-text-color has-background has-roboto-slab-font-family\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-c6326683 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading has-text-align-center nfd-text-huge nfd-text-primary\">2<\/h3>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center nfd-text-md\" style=\"font-size:16px\">Books<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-c6326683 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading has-text-align-center nfd-text-huge nfd-text-primary\">1<\/h3>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center nfd-text-md\" style=\"font-size:16px\">Book Chapters<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-c6326683 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading has-text-align-center nfd-text-huge nfd-text-primary\">6<\/h3>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center nfd-text-md\" style=\"font-size:16px\">Pending\/Issued Patents<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-c6326683 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading has-text-align-center nfd-text-huge nfd-text-primary\">15<\/h3>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center nfd-text-md\" style=\"font-size:16px\">Journals<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-c6326683 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading has-text-align-center nfd-text-huge nfd-text-primary\">49<\/h3>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center nfd-text-md\" style=\"font-size:16px\">Conferences<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-c6326683 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading has-text-align-center nfd-text-huge nfd-text-primary\">3<\/h3>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center nfd-text-md\" style=\"font-size:16px\">Abstract\/Non<br>Refereed<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-roboto-slab-font-family\" style=\"padding-top:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40);font-size:25px\">Books [2 Books]<\/h2>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(109,98,65) 20%,rgb(126,107,42) 41%,rgb(109,89,33) 68%,rgb(0,0,0) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[B2]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Hardware Security: A Look into the Future <\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Mark Tehranipoor, Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Navid Asadizanjani, Fahim Rahman, Farimah Farahmandi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\"><strong><em>Springer Nature<\/em><\/strong>.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--2\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-031-58687-3\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Link to the Online Version<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2024<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(109,98,65) 20%,rgb(126,107,42) 41%,rgb(109,89,33) 68%,rgb(0,0,0) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[B1]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Understanding Logic Locking <\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi, Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\"><strong><em>Springer Nature<\/em><\/strong>.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--3\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-031-37989-5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Link to the Online Version<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-roboto-slab-font-family\" style=\"padding-top:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40);font-size:25px\">Book Chapters [1 Book Chapters]<\/h2>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(23,30,9) 0%,rgb(85,85,45) 19%,rgb(106,115,60) 42%,rgb(92,102,63) 68%,rgb(34,41,8) 99%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[BC1]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Sequential and Combinational Satisfiability Attacks<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\"><em>Encyclopedia of Cryptography, Security and Privacy, <strong>Springer Nature<\/strong><\/em>.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--4\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/link.springer.com\/referenceworkentry\/10.1007\/978-3-642-27739-9_1655-1\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Link to the Online Version<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-roboto-slab-font-family\" style=\"padding-top:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40);font-size:25px\">Patents [4 Patents]<\/h2>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(35,32,32) 0%,rgb(89,64,64) 20%,rgb(112,66,66) 40%,rgb(123,59,59) 68%,rgb(61,21,21) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[P5]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Secure Test Process for Advanced Packaging Assisted Heterogeneous Inte-<br>grated Microelectronic Devices<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Mark Tehranipoor, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi, Galib I Heidar<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\"><strong><em>US Patent<\/em><\/strong>, TBD.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">TBD<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(35,32,32) 0%,rgb(89,64,64) 20%,rgb(112,66,66) 40%,rgb(123,59,59) 68%,rgb(61,21,21) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[P4]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Adaptive and Design-agnostic Active Watermarking for Authentication of Hardware Intellectual Property Core Ownership<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Farimah Farahmandi, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Mark Tehranipoor, Zahin Ibnat, Mohammad Sazadur Rahman, Mridha Md Mashahedur Rahman<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\"><strong><em>US Patent<\/em><\/strong>, TBD.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">TBD<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(35,32,32) 0%,rgb(89,64,64) 20%,rgb(112,66,66) 40%,rgb(123,59,59) 68%,rgb(61,21,21) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[P3]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Building And Redaction Of Universal Function Models For Hardware Protection<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Mark Tehranipoor, Mohammad Sazadur Rahman, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Fahim Rahman, Kimia Azar, Farimah Farahmandi,  Rui Guo<\/p>\n\n\n\n<div class=\"wp-block-buttons has-custom-font-size has-roboto-slab-font-family is-layout-flex wp-block-buttons-is-layout-flex\" style=\"font-size:15px;line-height:1\">\n<div class=\"wp-block-button is-style-outline is-style-outline--5\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/patents.google.com\/patent\/US20250005241A1\/en\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">US Patent &#8211; Online Version<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2025<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(35,32,32) 0%,rgb(89,64,64) 20%,rgb(112,66,66) 40%,rgb(123,59,59) 68%,rgb(61,21,21) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[P2]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Clock Gating System and Method For Protecting Hardware Design<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Mark Tehranipoor, Farimah Farahmandi, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Fahim Rahman, Mohammad Sazadur Rahman, Rui Guo<\/p>\n\n\n\n<div class=\"wp-block-buttons has-custom-font-size has-roboto-slab-font-family is-layout-flex wp-block-buttons-is-layout-flex\" style=\"font-size:15px;line-height:1\">\n<div class=\"wp-block-button is-style-outline is-style-outline--6\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/patents.google.com\/patent\/US20240419879A1\/en\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">US Patent &#8211; Online Version<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2024<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(35,32,32) 0%,rgb(89,64,64) 20%,rgb(112,66,66) 40%,rgb(123,59,59) 68%,rgb(61,21,21) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[P1]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Runtime Security Monitoring of Hardware Designs<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Mark Tehranipoor, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi, Kimia Azar, Tao Zhang<\/p>\n\n\n\n<div class=\"wp-block-buttons has-custom-font-size has-roboto-slab-font-family is-layout-flex wp-block-buttons-is-layout-flex\" style=\"font-size:15px;line-height:1\">\n<div class=\"wp-block-button is-style-outline is-style-outline--7\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/www.freepatentsonline.com\/y2024\/0411936.html\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">US Patent &#8211; Online Version<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2024<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-roboto-slab-font-family\" style=\"padding-top:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40);font-size:25px\">Journal Papers [14 Papers]<\/h2>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J15]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">EvoLUTe+: Fine-Grained Look-Up-Table-based RTL IP Redaction<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Rui Guo, Sazadur Rahman, Jingbo Zhou, Hadi Kamali, Farimah Farahmandi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\"><strong>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems <strong>(IEEE TCAD)<\/strong><\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-254b612cb3cecbdb63d216fcf19cdb49\" style=\"font-size:14px;font-style:normal;font-weight:100\">Hardware obfuscation is an active trustworthy design technique targeting threats in the IC supply chain, such as IP piracy and overproduction. Recent research on Intellectual Property (IP) protection technologies suggests that using embedded reconfigurable components (e.g., eFPGA redaction) could be a promising approach to hide the functional and structural information of security-critical designs. However, such techniques suffer from almost prohibitive overhead in terms of area, power, delay, and testability. This paper proposes an obfuscation technique called EvoLUTe+, which is a unique and more fine-grained redaction approach using smaller reconfigurable components (e.g., Look-Up Tables (LUTs)). EvoLUTe+ achieves fine-grained partitioning, sub-circuit coloring, and scoring of IP, and then encrypts the original IP through the substitution of some subcircuits. Different attacks are used to test the robustness of EvoLUTe+, including structural and machine learning attacks, as well as Bounded Model Checking (BMC) attacks. The overhead of the obfuscation design is also analyzed. Experimental results demonstrate that EvoLUTe+ exhibits robustness with acceptable overhead while resisting such threat models.<\/p>\n<\/details>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2025<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J14]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Advancing Trustworthiness in System-in-Package: A Novel Root-of-Trust Hardware Security Module for Heterogeneous Integration<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Md Sami Ul Islam Sami, Tao Zhang, Amit Mazumder Shuvo, Md Saad Ul Haque, Paul E. Calzada, Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\"><strong>IEEE Access<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-7e503ee882e148192f8d6f379a57b487\" style=\"font-size:14px;font-style:normal;font-weight:100\">The semiconductor industry has adopted heterogeneous integration (HI), incorporating modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to overcome the slowdown in Moore\u2019s Law and Dennard scaling and to respond to the increasing demand for advanced integrated circuits (ICs). Despite the manifold benefits of HI, such as enhanced performance, reduced area overhead, and improved yield, this transformation has also led to security vulnerabilities in the SiP supply chain and in-field operations, ranging from chiplet piracy and SiP reverse engineering (RE) to information leakage. Although conventional countermeasures provide the desired robustness for monolithic ICs, they are insufficient for addressing these challenges in the context of HI. To address these concerns, this paper presents a novel root-of-trust architecture, augmenting the process of integration using a centralized chiplet hardware security module (CHSM), aiming to provide comprehensive and robust protection throughout the SiP supply chain and in-field operations. Also, the proposed architecture equipped with the CHSM effectively addresses potential security breaches while providing robust protection against zero-day attacks through its reconfigurable capabilities. Throughout five detailed case studies, this paper performs a comprehensive security analysis to illustrate the resilience of CHSM against contemporary attack scenarios in the HI domain.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--8\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/document\/10466542\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--9\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=2633877184442147809\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2024<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J13]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Improving Bounded Model Checkers Scalability for Circuit De-obfuscation: An Exploration<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi, Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Transactions on Information Forensics and Security <strong>(IEEE TIFS)<\/strong>.<\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-d672784c3e33068890865f6cd8ecab0d\" style=\"font-size:14px;font-style:normal;font-weight:100\">With the globalization and distribution of the semiconductor supply chain, intellectual property (IP) protection has become a necessity. Recent years have witnessed a surge of interest in logic locking as a proactive IP protection solution. However, in recent years, we also have seen an increase in logic\/circuit de-obfuscation attacks that put the strength of logic locking at risk. One of these attacks on locked circuits is the bounded-model-checker (BMC)-based attack, where the adversary has limited access to the design-for-testability (DFT) (known as scan chain). While the BMC-based attack is widely known as an algorithmic attack, numerous studies show that the attack lacks scalability since it has two unrolling factors: sequential unrolling and miter duplication. Inspired by straightforward heuristics widely used for satisfiability problems in the computer science SAT community, in this paper, we will explore a set of methodologies that can have a significant impact on mitigating the BMC attack\u2019s scalability issue. For this purpose, through the BMC attack process, we explore the efficacy of \u201crestart\u201d and \u201cinitialization\u201d on the attack performance, in which we apply some modification on the locked design before (\u201cinitialization\u201d) or within (\u201crestart\u201d) the BMC execution. By applying \u201crestart\u201d and \u201cinitialization\u201d in numerous different configurations, our experimental results show &gt;85% consistent improvement in the BMC attack that can lead to a stronger algorithmic attack scenario on logic locking.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--10\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10412845\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--11\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=16289645769239393674\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2024<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J12]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities beneath Software<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Sree Ranjani Rajendran, Nusrat Farzana, Shams Tarek, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, <br>Mark Tehranipoor, Farimah Farahmandi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Transactions on Information Forensics and Security (<strong>IEEE TIFS<\/strong>).<\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-5a1d2c8785b5e3868262e536a3101c86\" style=\"font-size:14px;font-style:normal;font-weight:100\">Due to the increasing size and complexity of system-on-chips (SoCs), new threats and vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of decisive security requirements and properties from the perspective of the SoC designer, the system-level verification process, whose violation may lead to exploiting a hardware vulnerability, is not studied comprehensively. To enable more comprehensive verification of system-level properties, this paper presents a framework known as HUnTer (Hardware Underath Trigger) for identifying sets of instructions (sequences) at the processor unit (PU) that reveal the underlying hardware vulnerabilities. HUnTer automates (i) threat modeling, (ii) threat-based formal verification, (iii) generating counterexamples, and (iv) generating snippet code to exploit the vulnerability. Furthermore, the HUnTer framework defines a unique security coverage metric (HUnT_Coverage) to measure the performance and effectiveness of vulnerability exploits. To demonstrate the high effectiveness of the proposed framework, we conduct a wide variety of case studies using the HUnTer framework on RISC-V-based open-source SoC architecture and attains the security coverage of 86% as an average for 11 benchmarks of the Trust-Hub database.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--12\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/document\/10458674\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--13\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=6722040495626183320\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2024<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J11]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">SiPGuard: Run-time System-in-Package Security Monitoring via Power Noise Variation<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Tao Zhang, Latifur Rahman, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar, Farimah Farahmandi, Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Transactions on Very Large Scale Integration (VLSI) Systems <strong>(IEEE TVLSI)<\/strong>.<\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-bdf1eae50e8c48bda299eaed17651f51\" style=\"font-size:14px;font-style:normal;font-weight:100\">As Moore\u2019s law comes to a crawl, advanced package and integration techniques become increasingly crucial by allowing for the combination of fabricated silicon dies, so-called chiplet, to constitute system-in-package (SiP) achieving a much better yield and time-to-market. However, due to inherent security concerns within the convoluted semiconductor supply chain and in-field environment, hostile attacks targeting software and hardware applications can present a formidable challenge to ensuring the security of SiP. Even worse, the immanent black-box nature of product chiplets renders most conventional security inspection and testing solutions less useful. Therefore, we present our SiPGuard in this article to enable the security monitoring capability during run time to noninvasively track the application-level behaviors of target chiplets and detect any deviations potentially induced by underlying malicious intrusions. The security monitoring mechanism utilizes information-bearing system-level power noise variation and machine learning (ML) techniques. Specifically, we utilize a trusted field-programmable gate array (FPGA) chiplet as our trust anchor to implement the lightweight power sensor and on-chip ML inference engine for near-sensor analysis. We prototype our solution on a 2.5-D chiplet-based FPGA device and demonstrate the effectiveness against threats at software\/hardware levels by identifying the consequent power anomalies of malicious activities.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--14\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10286457\/\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--15\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=18075425134374140271\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J10]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">ReTrustFSM: Towards RTL Hardware Obfuscation &#8211; A Hybrid FSM Approach<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Mohammad Sazadur Rahman, Rui Guo, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\"><strong>IEEE Access<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-5c8978c423d0db92354103a682a90d0f\" style=\"font-size:14px;font-style:normal;font-weight:100\">Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes. Nevertheless, de-obfuscation attacks have demonstrated their insufficiency. This paper proposes a register-transfer (RT) level finite-state-machine (FSM) obfuscation technique called ReTrustFSM that allows designers to obfuscate at the earliest possible stage. ReTrustFSM combines three types of secrecy: explicit external secrecy via an external key, implicit external secrecy based on specific clock cycles, and internal secrecy through a concealed FSM transition function. So, the robustness of ReTrustFSM relies on the external key, the external primary input patterns, and the cycle accuracy of applying such external stimuli. Additionally, ReTrustFSM defines a cohesive relationship between the features of Boolean problems and the required time for de-obfuscation, ensuring a maximum execution time for oracle-guided de-obfuscation attacks. Various attacks are employed to test ReTrustFSM\u2019s robustness, including structural and machine learning attacks, functional I\/O queries (BMC), and FSM attacks. We have also analyzed the corruptibility and overhead of design-under-obfuscation. Our experimental results demonstrate the robustness of ReTrustFSM at acceptable overhead\/corruption while resisting such threat models.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--16\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10043856\/\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--17\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=1372927274611771807&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J9]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Enabling Security Of Heterogeneous Integration: From Supply Chain To In-Field Operations<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Md Sami Ul Islam Sami, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi, Fahim Rahman, Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Design and Test <strong>(IEEE D&amp;T)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-4d4b8297c1bf5a8847df94fa8a16887f\" style=\"font-size:14px;font-style:normal;font-weight:100\">Witnessing significant signs of a slowdown of Moore\u2019s law and Dennard scaling has pushed leading semiconductor companies toward advanced packaging with heterogeneous integration (HI) to stay away from the challenges of monolithic IC in more shrunk technology with higher complexity. In light of the advances made in monolithic ICs, this paper explores how these promising solutions can be extended for secure HI. For this purpose, by investigating the trustworthiness of the system-in-package (SiP) supply chain, we introduce possible trust validation and attack mitigation methodologies leading to establishing the fundamentals of end-to-end secure HI.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--18\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10108064\/\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--19\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=12074671256098535502\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J8]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">HLock+: A Robust and Low-Overhead Logic Locking at the High-Level Language<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Md Rafid Muttaki, Roshanak Mohammadivojdan, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Mark Tehranipoor, Farimah Farahmandi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems <strong>(IEEE TCAD)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-af82c50085792745834385b76182b415\" style=\"font-size:14px;font-style:normal;font-weight:100\">With the emergence of the horizontal business model in the semiconductor industry, numerous hardware security concerns have been emerged, including intellectual property (IP) theft, malicious functionality insertion, and IC overproduction. To combat these threats, logic locking has been introduced as one of the most prominent countermeasures, and advances in logic locking have led the most recent techniques toward higher levels of abstractions, i.e., register transfer language (RTL) or high-level languages (C\/C++). In this article, we propose HLock+, a robust logic locking framework at the high-level design language. HLock+ consists of two main parts to achieve multiple goals: 1) Locking in HLock+ is based on a formal analysis over design specifications, assets, and critical operations to determine locking points in the design to provide the best solution in terms of desired attack resiliency (e.g., SAT attacks), and locking key size and 2) we integrate the formal analysis with a point function locking technique, in which the locking candidates have been chosen by an optimization algorithm helping us to boost the efficiency of the approach with the given area, power, and performance constraints. Furthermore, the proposed framework ensures a dynamic\/automatic locking solution based on a set of specifications, and it is well suited for large-scale designs. Apart from having lesser development\/verification efforts, HLock+ at high-level language will be followed by high-level synthesis (HLS) and RTL synthesis, which provides superior uniform distribution and optimum output corruptibility. We show that HLock+ provides potent robustness against de-obfuscation attacks, e.g., SAT and machine-learning-based attacks, while the overhead is kept low.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--20\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9925097\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--21\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=10533363910023747711&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J7]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">From cryptography to logic locking: A survey on the architecture evolution of secure scan chains<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Houman Homayoun, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\"><strong>IEEE Access<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-14de5732986a25eeb7855bc5a9be0449\" style=\"font-size:14px;font-style:normal;font-weight:100\">The availability of access to Integrated Circuits&#8217; scan chain is an inevitable requirement of modern ICs for testability\/debugging purposes. However, leaving access to the scan chain OPEN resulted in numerous security threats on ICs. It raises challenging concerns particularly when the secret asset, like secret information, is placed within the chip, such as the keys of cryptographic algorithms, or similarly logic obfuscation key. So, to combat these threats, numerous secure scan chain architectures have been proposed in the literature to prevent any unauthorized access to the scan chain. They also keep the availability of the scan chain for testability\/debugging. In this paper, we first show why a secure scan chain architecture is required when security primitives, like logic obfuscation, are in place. Then, we provide a holistic overview of all secure scan chain architectures starting from preliminary methods introduced when cryptography is in place and the adversary threat model is very limited. It is then followed by newer and more advanced methods introduced when logic obfuscation is in place and the adversary threat model is much stronger. Hence, we have more concentration on the architecture proposed more recently on logic obfuscation. We evaluate all secure scan chain architectures in terms of security and resiliency, testability\/debugging time and complexity, and area\/power\/delay overhead.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--22\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9431198\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--23\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?cites=13651487619056677352&amp;as_sdt=40005&amp;sciodt=0,10&amp;hl=en\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2021<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J6]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Deep graph learning for circuit deobfuscation<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Zhiqian Chen, Lei Zhang, Gaurav Kolhe, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Setareh Rafatirad, Sai Manoj Pudukotai Dinakarrao, Houman Homayoun, Chang-Tien Lu, and Liang Zhao<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Frontiers in big Data <strong>(Frontier)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-7dc2c6cacbfd37edf1041534e99d5384\" style=\"font-size:14px;font-style:normal;font-weight:100\">Circuit obfuscation is a recently proposed defense mechanism to protect the intellectual property (IP) of digital integrated circuits (ICs) from reverse engineering. There have been effective schemes, such as satisfiability (SAT)-checking based attacks that can potentially decrypt obfuscated circuits, which is called de-obfuscation. De-obfuscation runtime could be days or years, depending on the layouts of the obfuscated ICs. Hence, accurately pre-estimating the de-obfuscation runtime within a reasonable amount of time is crucial for IC designers to optimize their defense. However, it is challenging due to (1) the complexity of graph-structured circuit; (2) the varying-size topology of obfuscated circuits; (3) requirement on efficiency for de-obfuscation method. This study proposes a framework that predicts the de-obfuscation runtime based on graph deep learning techniques to address the challenges mentioned above. A conjunctive normal form (CNF) bipartite graph is utilized to characterize the complexity of this SAT problem by analyzing the SAT attack method. Multi-order information of the graph matrix is designed to identify the essential features and reduce the computational cost. To overcome the difficulty in capturing the dynamic size of the CNF graph, an energy-based kernel is proposed to aggregate dynamic features into an identical vector space. Then, we designed a framework, Deep Survival Analysis with Graph (DSAG), which integrates energy-based layers and predicts runtime inspired by censored regression in survival analysis. Integrating uncensored data with censored data, the proposed model improves the standard regression significantly. DSAG is an end-to-end framework that can automatically extract the determinant features for de-obfuscation runtime. Extensive experiments on benchmarks demonstrate its effectiveness and efficiency.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--24\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/www.frontiersin.org\/articles\/10.3389\/fdata.2021.608286\/full\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--25\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=3214659400017629876&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2021<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J5]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Data Flow Obfuscation: A New Paradigm for Obfuscating Circuits<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Shervin Roshanisefat, Houman Homayoun, Christos P. Sotiriou, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Transactions on Very Large Scale Integration (VLSI) Systems <strong>(IEEE TVLSI)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-6a52e1a07bd81ecca0726c28e6a7f076\" style=\"font-size:14px;font-style:normal;font-weight:100\">In this article, unlike almost all state-of-the-art obfuscation solutions that focus on functional\/logic obfuscation, we introduce a new paradigm, called data flow obfuscation, which exploits the essence of asynchronicity. In data flow obfuscation, by benefiting from the handshaking mechanism of asynchronous circuits, the system&#8217;s FFs\/latches will operate out of sync. Hence, the adversary has no sufficient knowledge to apply unrolling\/BMC. Also, due to the inherited asynchronicity, the exact time of writing\/capturing data into\/from the scan chain becomes hidden. Hence, the SAT attack cannot be applied even while scan chain access is open. Moreover, our new proposed paradigm creates stateful\/oscillating combinational cycles into the design which extensively boosts the difficulty of modeling this technique. We also demonstrate how data flow obfuscation could easily be integrated with any circuit at low overhead while there is no limitation such as compromising test flow.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--26\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9369866\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--27\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=15498061215895167058&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2021<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J4]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">SAT-hard Cyclic Logic Obfuscation for Protecting the IP in the Manufacturing Supply Chain<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Shervin Roshanisefat, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Houman Homayoun, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Transactions on Very Large Scale Integration (VLSI) Systems <strong>(IEEE TVLSI)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-6a52e1a07bd81ecca0726c28e6a7f076\" style=\"font-size:14px;font-style:normal;font-weight:100\">In this article, unlike almost all state-of-the-art obfuscation solutions that focus on functional\/logic obfuscation, we introduce a new paradigm, called data flow obfuscation, which exploits the essence of asynchronicity. In data flow obfuscation, by benefiting from the handshaking mechanism of asynchronous circuits, the system&#8217;s FFs\/latches will operate out of sync. Hence, the adversary has no sufficient knowledge to apply unrolling\/BMC. Also, due to the inherited asynchronicity, the exact time of writing\/capturing data into\/from the scan chain becomes hidden. Hence, the SAT attack cannot be applied even while scan chain access is open. Moreover, our new proposed paradigm creates stateful\/oscillating combinational cycles into the design which extensively boosts the difficulty of modeling this technique. We also demonstrate how data flow obfuscation could easily be integrated with any circuit at low overhead while there is no limitation such as compromising test flow.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--28\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8989982\/\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--29\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=3646582097568110864&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2020<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J3]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond The SAT Attacks<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Houman Homayoun, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IACR Transactions on Cryptographic Hardware and Embedded Systems <strong>(IACR TCHES)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-9f82ef1d98425e411f2209cf70e1de5b\" style=\"font-size:14px;font-style:normal;font-weight:100\">In this paper, we introduce the Satisfiability Modulo Theory (SMT) attack on obfuscated circuits. The proposed attack is the superset of Satisfiability (SAT) attack, with many additional features. It uses one or more theory solvers in addition to its internal SAT solver. For this reason, it is capable of modeling far more complex behaviors and could formulate much stronger attacks. In this paper, we illustrate that the use of theory solvers enables the SMT to carry attacks that are not possible by SAT formulated attacks. As an example of its capabilities, we use the SMT attack to break a recent obfuscation scheme that uses key values to alter delay properties (setup and hold time) of a circuit to remain SAT hard. Considering that the logic delay is not a Boolean logical property, the targeted obfuscation mechanism is not breakable by a SAT attack. However, in this paper, we illustrate that the proposed SMT attack, by deploying a simple graph theory solver, can model and break this obfuscation scheme in few minutes. We describe how the SMT attack could be used in one of four different attack modes: (1) We explain how SMT attack could be reduced to a SAT attack, (2) how the SMT attack could be carried out in Eager, and (3) Lazy approach, and finally (4) we introduce the Accelerated SMT (AccSMT) attack that offers significant speed-up to SAT attack. Additionally, we explain how AccSMT attack could be used as an approximate attack when facing SMT-Hard obfuscation schemes.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--30\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7335\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--31\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=1967408750960101170&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2019<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J2]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">DuCNoC: A High-Throughput FPGA-Based NoC Simulator Using Dual-Clock Lightweight Router Micro-Architecture<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar, Shaahin Hessabi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Transactions on Computers <strong>(IEEE TC)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-3412f25bfe57c980c5f5dd3dd4224ea2\" style=\"font-size:14px;font-style:normal;font-weight:100\">On-chip interconnections play an important role in multi\/many-processor systems-on-chip (MPSoCs). In order to achieve efficient optimization, each specific application must utilize a specific architecture, and consequently a specific interconnection network. For design space exploration and finding the best NoC solution for each specific application, a fast and flexible NoC simulator is necessary, especially for large design spaces. In this paper, we present an FPGA-based NoC co-simulator, which is able to be configured via software. In our proposed NoC simulator, entitled&nbsp;<em>DuCNoC<\/em>&nbsp;, we implement a&nbsp;<em>Dual-Clock<\/em>&nbsp;router micro-architecture, which demonstrates 75x&nbsp;\u2212&nbsp;350x speed-up against BOOKSIM. Additionally, we implement a two-layer configurable global interconnection in our proposed architecture to (1) reduce virtualization time overhead, (2) make an efficient trade-off between the resource utilization and simulation time of the whole simulator, and especially (3) provide the capability of simulating irregular topologies. Migration of some important sub-modules like traffic generators (TGs) and traffic receptors (TRs) to software side, and implementing a dual-clock context switching in virtualization are other major features of DuCNoC. Thanks to its dual-clock router micro-architecture, as well as TGs and TRs migration to software side, DuCNoC can simulate a 100-node (10&nbsp;\u00d7&nbsp;10) non-virtualized or a 2048-node virtualized mesh network on Xilinx Zynq-7000.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--32\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8000664\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--33\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=2944030587398017472&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2017<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(97,97,97) 20%,rgb(129,129,129) 41%,rgb(102,102,102) 68%,rgb(26,26,26) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[J1]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">A Fault Tolerant Parallelism Approach for Implementing High-throughput Pipelined Advanced Encryption Standard<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Shaahin Hessabi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Journal of Circuits, Systems and Computers <strong>(JCSC)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-37b32bd9257f1e0a8eedf9ba80cf7f63\" style=\"font-size:14px;font-style:normal;font-weight:100\">Advanced Encryption Standard (AES) is the most popular symmetric encryption method, which encrypts streams of data by using symmetric keys. The current preferable AES architectures employ effective methods to achieve two important goals: protection against power analysis attacks and high-throughput. Based on a different architectural point of view, we implement a particular parallel architecture for the latter goal, which is capable of implementing a more efficient pipelining in field-programmable gate array (FPGA). In this regard, all intermediate registers which have a role for unrolling the main loop will be removed. Also, instead of unrolling the main loop of AES algorithm, we implement pipelining structure by replicating nonpipelined AES architectures and using an auto-assigner mechanism for each AES block. By implementing the new pipelined architecture, we achieve two valuable advantages: (a) solving single point of failure problem when one of the replicated parts is faulty and (b) deploying the proposed design as a fault tolerant AES architecture. In addition, we put emphasis on area optimization for all four AES main functions to reduce the overhead associated with AES block replication. The simulation results show that the maximum frequency of our proposed AES architecture is 675.62MHz, and for AES128 the throughput is 86.5Gbps which is 30.9% better than its closest existing competitor.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--34\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218126616501139\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--35\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=15806857354715404813&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2016<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-roboto-slab-font-family\" style=\"padding-top:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40);font-size:25px\">Conference Papers [49 Papers]<\/h2>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C49]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">CircuitGuard: Mitigating LLM Memorization in RTL Code Generation Against IP Leakage<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Nowfel Mashnoor, Mohammad Akyash, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE International Conference on Computer Design<strong> (ICCD)<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2025<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C48]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">SAGE-HLS: Syntax-Aware AST-Guided LLM for High-Level Synthesis Code Generation<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">M Khan, Nowfel Mashnoor, Mohammad Akyash, Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong><\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE International Conference on Computer Design<strong> (ICCD)<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2025<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C47]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">DecoRTL: A Run-time Decoding Framework for RTL Code Generation with LLMs<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Nowfel Mashnoor, Mohammad Akyash, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE\/ACM International Conference On Computer Aided Design<strong> (ICCAD)<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2025<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C46]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">TimelyHLS: LLM-Based Timing-Aware and Architecture-Specific FPGA HLS Optimization<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Nowfel Mashnoor, Mohammad Akyash, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE International Conference on Omni-layer Intelligent Systems<strong> (COINS)<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--36\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/document\/11125726\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--37\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=10828897467009594498\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2025<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C45]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">RTL++: Graph-enhanced LLM for RTL Code Generation<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Mohammad Akyash, Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong><\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE International Conference on LLM-Aided Design<strong> (ICLAD)<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--38\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/document\/11106035\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--39\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=6042755301333836943\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2025<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C44]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">LLM-IFT: LLM-Powered Information Flow Tracking for Secure Hardware<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Nowfel Mashnoor, Mohammad Akyash, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE VLSI Test Symposium <strong>(VTS)<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--40\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/11022949\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--41\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=14982136082458494048\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2025<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 11%,rgb(69,88,99) 35%,rgb(7,7,7) 67%,rgb(201,174,77) 72%,rgb(188,169,66) 96%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C43]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">StepGrade: Grading Programming Assignments with Context-Aware LLMs<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Mohammad Akyash, Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong><\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Integrated STEM Education Conference<strong> (ISEC)<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--42\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/document\/11147374\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--43\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=8589671777722168356\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-da547260581ea22cd70d6d8004fe1b6a\"><strong>The Best Paper Award &#8211; ISEC 2023<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2025<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C42]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">SimEval: Investigating the Similarity Obstacle in LLM-based Hardware Code Generation<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Mohammad Akyash, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong><\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Asia and South Pacific Design Automation Conference <strong>(ASP-DAC)<\/strong><\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\"><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--44\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3658617.3697624\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--45\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=12272379390341473054&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\"><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2025<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 11%,rgb(69,88,99) 35%,rgb(7,7,7) 72%,rgb(201,174,77) 75%,rgb(188,169,66) 96%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C41]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">NoXLock: SiP Activation and Licensing through Obfuscated on-Chip Network and Fuzzy Traffic<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Md Saad Ul Haque, Azim Uddin, Jingbo Zhou, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi, Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Asia and South Pacific Design Automation Conference <strong>(ASP-DAC)<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--46\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3658617.3697762\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--47\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=8188605144661705876\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity has-link-color\"\/>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-9840a5dc66eb24d1c5c4d6d900c7a665\"><strong>Nominated for the Best Paper Award &#8211; ASP-DAC 2025<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2025<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C40]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Self-HWDebug: Automation of Self-Instructing for LLM in Hardware Security<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Mohammad Akyash, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong><\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Computer Society Annual Symposium on VLSI <strong>(ISVLSI)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>The rise of instruction-tuned Large Language Models (LLMs) marks a significant advancement in artificial intelligence (AI) (tailored to respond to specific prompts). Despite their popularity, applying such models to debug security vulnerabilities in hardware designs, i.e., register transfer language (RTL) modules, particularly at system-on-chip (SoC) level, presents considerable challenges. One of the main issues lies in the need for precisely designed instructions for pinpointing and mitigating the vulnerabilities, which requires substantial time and expertise from human experts. In response to this challenge, this paper proposes Self-HWDebug, an innovative framework that leverages LLMs to automatically create required debugging instructions. In Self-HWDebug, a set of already identified bugs from the most critical hardware common weakness enumeration (CWE) listings, along with mitigation resolutions, is provided to the framework, followed by prompting the LLMs to generate targeted instructions for such mitigation. The LLM-generated instructions are subsequently used as references to address vulnerabilities within the same CWE category but in totally different designs, effectively demonstrating the framework&#8217;s ability to extend solutions across related security issues. Self-HWDebug significantly reduces human intervention by using the model&#8217;s own output to guide debugging. Through comprehensive testing, Self-HWDebug proves not only to reduce experts&#8217; effort\/time but also to even improve the Quality of the debugging process.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--48\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/document\/10682659\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--49\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;authuser=2&amp;cites=2435682210941731024\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2024<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C39]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Evolutionary Large Language Models for Hardware Security: A Comparative Survey<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Mohammad Akyash, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong><\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">ACM Great Lakes Symposium on VLSI <strong>(GLSVLSI)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Automating hardware (HW) security vulnerability detection and mitigation during the design phase is imperative for two reasons: (i) It must be before chip fabrication, as post-fabrication fixes can be costly or even impractical; (ii) The size and complexity of modern HW raise concerns about unknown vulnerabilities compromising CIA triad. While Large Language Models (LLMs) can revolutionize both HW design and testing processes, within the semiconductor context, LLMs can be harnessed to automatically rectify security-relevant vulnerabilities inherent in HW designs. This study explores the seeds of LLM integration in register transfer level (RTL) designs, focusing on their capacity for autonomously resolving security-related vulnerabilities. The analysis involves comparing methodologies, assessing scalability, interpretability, and identifying future research directions. Potential areas for exploration include developing specialized LLM architectures for HW security tasks and enhancing model performance with domain-specific knowledge, leading to reliable automated security measurement and risk mitigation associated with HW vulnerabilities.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--50\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3649476.3660390\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--51\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=13705159414762076191&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2024<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C38]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">GATE-SiP: Enabling Authenticated En- cryption Testing in Systems-in-Package<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Galib I Heidar, Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Mark Tehranipoor, Farimah Farahmandi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Design Automation Conference <strong>(DAC)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>A heterogeneous integrated system in package (SIP) system integrates chiplets outsourced from different vendors into the same substrate for better performance. However, during post-integration testing, the sensitive testing data designated for a specific chiplet can be blocked, tampered or sniffed by other malicious chiplets. This paper proposes GATE-SiP which is an authenticated partial encryption protocol to enable secure testing. Within GATE-SiP, the sensitive testing pattern will only be sent to the authenticated chiplet. In addition, partial encryption of the sensitive data prevents data sniff threats without causing significant penalties on timing overhead. Extensive simulation results show the GATE-SiP protocol only brings 6.74% and 14.31% on area and timing overhead, respectively.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--52\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3656527\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2024<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C37]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">PQC-HI: PQC-enabled Chiplet authentication and Key Exchange in Heterogeneous Integration<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Md Saad Ul Haque, Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi, Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Electronic Components and Technology Conference <strong>(IEEE ECTC)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Integrating heterogeneous components in multi-chiplet packaging, known as system-in-package (SiP), is a significant step forward in overcoming limitations by Moore\u2019s Law and Dennard scaling. This innovative approach offers enhanced efficiency, cost-effectiveness, and accelerated time-to-market. However, with its globalized supply chain, SiP technology introduces security vulnerabilities distinct from those in system-on-chip (SoC) designs. These risks include potential data leaks, the insertion of malicious circuits within the active interposer, and the possibility of extracting security assets through probing attacks. Current defenses used for traditional SoCs are not adequately designed for this multi-chiplet integration. Moreover, these solutions are vulnerable to quantum attacks due to their reliance on classical methods. In this paper, we introduce PQC-HI, a novel post-quantum-enabled chiplet authentication and key encapsulation framework to safeguard SiP security assets against the supply chain and in-field vulnerabilities. PQC-HI relies on two critical components that need to be integrated into the SiP architecture: the chiplet hardware security module (CHSM) and chiplet security intellectual property (CSIP). Our approach is based on NIST standards CRYSTALS-Kyber and CRYSTALS-Dilithium, providing a protocol resilient to quantum attacks and ensuring secure SiP communication. We implemented this protocol on an FPGA platform and demonstrated the efficiency and area overhead.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--53\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10564970\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2024<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C36]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">From Full-Custom to Gate-Array ASIC for Hardware IP Protection<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong><\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Dallas Circuits and Systems Conference <strong>(IEEE DCAS)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>The employment of fully reconfigurable logic and routing modules represents a promising and potentially resilient approach to combating intellectual property (IP) piracy and the overproduction of integrated circuits (IC). Over time, the utilization of such reconfigurable logic has evolved within the realm of hardware security, encompassing a spectrum of protective measures and security monitoring solutions. This evolution underscores a technological transition within this domain, shifting from full-custom ASICs to gate-array ASICs to enhance robustness. This paper delineates the progression within this field, tracing advancements from rudimentary look-up-table based methods to sophisticated partial reconfigurable ASICs featuring embedded FPGAs (eFPGAs). The investigation critically evaluates the merits and limitations of each technique, and advocates for a strategic trajectory that optimizes efficiency and upholds the promised robustness.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--54\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10539912\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2024<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C35]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">GEM-Water: Generation of EM-based Watermark for SoC IP Validation with Hidden FSMs<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Pantha Sarker, Upoma Das, Mohammed Monjil, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi, Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">International Symposium for Testing and Failure Analysis <strong>(ISTFA)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Intellectual property (IP) core reuse is a common practice for accelerating new product development in modern system-on-chip (SoC) architectures. However, reusing and sharing IP cores in today\u2019s competitive market poses significant security risks. IP watermarking is a potential solution for detecting unauthorized IP duplication and overuse. In this paper, we propose GEM-Water, a robust IP watermark verification scheme that uses electromagnetic (EM) radiation of an IP in an SoC for watermark extraction during boot-up. This is accomplished by applying an n-bit challenge to the IP that triggers some certain state transition in a Finite State Machine (FSM) during boot-up. The FSM output is then mapped into an EM signature which can be extracted and processed to generate expected responses to prove IP ownership. GEM-Water has been implemented in a wide variety of benchmarks using several AMD Xilinx 7 series FPGAs, and the experimental results validate the robustness and viability of the suggested approach with &gt;95% accuracy.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--55\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.asminternational.org\/istfa\/proceedings\/ISTFA2023\/84741\/271\/28603\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--56\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=6634808917315815211\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C34]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">SHI-Lock: Enabling Co-Obfuscation for Secure Heterogeneous Integration against RE and Cloning<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Md Saad Ul Haque, Rui Guo, Mohammad Sazadur Rahman, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi, Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Conference on Physical Assurance and inspection of Electronics <strong>(PAINE)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>With the limitations of Moore&#8217;s Law and Dennard scaling in integrated circuits (ICs) on the horizon, the concept of heterogeneous integration (HI) has gained significant traction as a favored method for creating System-in-Packages (SiP) through the utilization of chiplets. However, this shift brings forth a fresh set of security concerns, wherein the SiPs or their chiplets are vulnerable to a vector of threats, including reverse engineering and unauthorized overproduction. In this paper, we introduce SHI-Lock, as a first-of-its-kind hardware co-obfuscation countermeasure for System-in-Package. In SHI-Lock, by relying on a chiplet-hardware-security-module (CHSM), a co-obfuscation mechanism has been shared (interaction-based) between the chiplet designer(s) and the SiP integrator, allowing them to extend the protection in both intra-chiplet and inter-chiplet domains. SHI-Lock consists of a {obfuscation + key provisioning} protocol that enables forward trusts for chiplet designers to extend the chiplet-level obfuscation techniques to be used in multiple SiP designs. The co-obfuscation relies on a finite-state-machine (FSM) obfuscation and acts as a license activation protocol in HI. We evaluate the robustness of SHI-Lock using various metrics and threats including functional and structural attacks and perform overhead analysis of design-under-obfuscation, verifying that SHI-Lock can effectively be integrated into chiplets to create obfuscation at both Chiplet-level and system-level to protect SiPs from piracy and overproduction.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--57\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10317951\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--58\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=7256077139004683346\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C33]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">PALLET: Protecting Analog Devices using a Last-Level Edit Technique<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Md Rafid Muttaki, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Mark Tehranipoor, Farimah Farahmandi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Conference on Physical Assurance and inspection of Electronics <strong>(PAINE)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>For the past decade, hardware obfuscation has been a popular approach for protecting integrated circuits (ICs) against supply chain threats such as intellectual property (IP) piracy and overproduction. Despite this, the design of these techniques was originally for the digital domain and is not appropriate for analog circuits due to their intrinsic features, such as their small size. In this paper, we propose PALLET, a last-level edit (LLE) relying on a unique keyless obfuscation technique for pure analog and mixed-signal circuits to protect the design against untrusted foundries. In PALLET, design functionality is obfuscated by adding misleading (false) elements to the circuit layout based on design specifications and area overhead constraints. In PALLET, after fabrication of the LLEed (obfuscated) IC, the design house with a trusted focused-ion beam (FIB) facility performs the circuits edit at the top metal layers to de-obfuscate (remove LLE from) the IC with minimal effort. We also focus on a mathematical representation to show adversarial computation complexity based on the LLE framework. Finally, to validate the efficacy of LLE, we perform a security assessment against prominent attacks and compare post-layout performance parameters for a bandgap reference (BGR) design to demonstrate compliance with design specifications.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--59\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10318023\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--60\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=16660921734630003142\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C32]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Iterative Mitigation of Insecure Resource Sharing Produced by High-level Synthesis<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Zahin Ibnat, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Int&#8217;l Symp. on Defect and Fault Tolerance in VLSI and Nanotechnology Systems <strong>(DFT)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>High-level synthesis (HLS) has revolutionized hardware design by allowing engineers to code their designs in higher abstraction levels like C\/C++. To generate register-transfer level (RTL) design, HLS optimizes hardware designs for improving overheads (e.g., area, power, throughput). However, the optimizations are not done with security in mind. Therefore, HLS can introduce new vulnerabilities (e.g., information leakage and access control violations) to the design through optimizing. One such security violation is vulnerable resource sharing where in attempting to minimize the area of the hardware design, HLS uses the same resources between assets without taking into account the secure and non-secure computing. The secure asset&#8217;s operations are then not done in a secure manner, allowing for the possibility of an attacker controlling such resources to gain valuable insight into the asset&#8217;s information. Mitigating such a vulnerability would require the integration of identification algorithms to separate the secure and non-secure operations. In this paper, we introduce a toolflow to mitigate vulnerable resource sharing by utilizing intermediate representations (IR) files to identify the shared resource(s) and conducting an intellectual property (IP) separation at the high-level language (HLL) to have a separate resource handling the security operations.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--61\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/document\/10313550\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C31]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Security of Hardware Generators: Enabling Assurance in High-Level Synthesis<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Md Rafid Muttaki, Zahin Ibnat, Shang Shi, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE International Midwest Symposium on Circuits and Systems <strong>(MWSCAS)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>High-level synthesis (HLS) has revolutionized hardware design by allowing engineers to code their designs in higher abstraction levels like C\/C++. To generate register-transfer level (RTL) design, HLS optimizes hardware designs for improving overheads (e.g., area, power, throughput). However, the optimizations are not done with security in mind. Therefore, HLS can introduce new vulnerabilities (e.g., information leakage and access control violations) to the design through optimizing. One such security violation is vulnerable resource sharing where in attempting to minimize the area of the hardware design, HLS uses the same resources between assets without taking into account the secure and non-secure computing. The secure asset&#8217;s operations are then not done in a secure manner, allowing for the possibility of an attacker controlling such resources to gain valuable insight into the asset&#8217;s information. Mitigating such a vulnerability would require the integration of identification algorithms to separate the secure and non-secure operations. In this paper, we introduce a toolflow to mitigate vulnerable resource sharing by utilizing intermediate representations (IR) files to identify the shared resource(s) and conducting an intellectual property (IP) separation at the high-level language (HLL) to have a separate resource handling the security operations.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--62\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10405962\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C30]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">ActiWate: Adaptive and Design-agnostic Active Watermarking for IP Ownership in Modern SoCs<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Zahin Ibnat, M Sazadur Rahman, Mridha Mashahedur Rahman, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Mark Tehranipoor, Farimah Farahmandi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Design Automation Conference <strong>(DAC)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Watermarking offers a viable solution to combat IP piracy and illegal re-use. However, watermarking verification techniques rely heavily on manual testing by verification engineers and ignore the possibility of having a rogue SoC design house. To automate the watermarking-based verification process and to be against wider attacks (e.g., rogue design house), this paper presents ActiWate, which conducts automatic self-verification by communicating with various peripherals within the SoC. Showing its resilience against removal and spoofing attacks, ActiWate is architectured to be an IP\/SoC-agnostic watermarking and our experiments demonstrate its versatility by implementing it on multiple RISC-V SoCs with different components\/peripherals.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--63\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10247688\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--64\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=9069596091743248738\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C29]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Metrics-to-Methods: Decisive Reverse Engineering Metrics for Resilient Logic Locking<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Mohammad Sazadur Rahman, Kimia Azar, Farimah Farahmandi, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong><\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">ACM Great Lakes Symposium on VLSI <strong>(GLSVLSI)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>As logic locking becomes more sophisticated and new technologies emerge (e.g., laser probing for failure analysis), the statement &#8220;logic locking is dead&#8221; will become more common. While recent studies have investigated the possibility of defining a security metric(s) for logic locking, none are sufficient against all threat models and potential future threats. In this paper, we first examine the quantitative and qualitative metrics as a MUST for logic locking. Then, by establishing a bridge between metrics and the potential methods, we introduce a compound-style logic locking that can meet the criteria needed for logic locking based on the defined metrics.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--65\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3583781.3590273\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--66\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=18374245225099804573&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C28]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">FISHI: Fault Injection Detection in Secure Heterogeneous Integration via Power Noise Variation<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Tao Zhang, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar, Mark Tehranipoor, Farimah Farahmandi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Electronic Components and Technology Conference <strong>(ECTC)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>As Moore&#8217;s law comes to a crawl, heterogeneous integration-based system-in-package emerges as a promising direction to maintain the speedy rate of performance density improvement of modern integrated circuits by integrating fabricated silicon dies into a unified package. However, hardware security threats such as fault injection attacks present formidable challenges to the protection of on-chip assets. Even worse than a conventional monolithic device, system-in-package (SiP) might introduce malicious chiplets to allow for internal and remote power fault injection attacks due to the obscurity of the semiconductor supply chain. In order to thwart fault injection attacks, we present FISHI which aims to include a root-of-trust chiplet in the SiP to enable run-time system-level power noise variation monitoring capabilities and near-sensor machine learning inference for attack-induced anomaly detection. Specifically, we design a time-to-digital converter to collect power profiles of targeted applications as a reference and create a hardware ML engine accordingly to measure the deviations between the run-time power fluctuations and the golden ones. We prototype our FISHI solution on one of the chiplets in a Xilinx 2.5D FPGA SiP and demonstrate its effectiveness by detecting power fault injection attempts on an AES implementation on the other chiplet.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--67\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10195472\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--68\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=1891438106912446136\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C27]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">HUnTer: Hardware Underneath Trigger for Exploiting SoC-level Vulnerabilities<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Sree Ranjani Rajendran, Shams Tarek, Benjamin Myers Hicks, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi, Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Design, Automation and Test in Europe Conference <strong>(DATE)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Systems-on-chip (SoCs) have become increasingly large and complex, resulting in new threats and vulnerabilities, mainly related to system-level flaws. However, the system-level verification process, whose violation may lead to exploiting a hardware vulnerability, is not studied comprehensively due to the lack of decisive (security) requirements and properties from the SoC designer&#8217;s perspective. To enable a more comprehensive verification for system-level properties, this paper presents HUnTer (Hardware Underneath Trigger), a framework for identifying sets (sequences) of instructions at the processor unit (PU) that unveils the underneath hardware vulnerabilities. The HUnTer framework automates (i) threat modeling, (ii) threat-based formal verification, (iii) generation of counterexamples, and (iv) generation of snippet code for exploiting the vulnerability. The HUnTer framework also defines a security coverage metric (HUnT_Coverage) to measure the performance and efficacy of the proposed approach. Using the HUnTer framework on a RISC-V-based open-source SoC architecture, we conduct a wide variety of case studies of Trust-HUB vulnerabilities to demonstrate the high effectiveness of the proposed framework.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--69\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10137139\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--70\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=10363016367503218109&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 11%,rgb(69,88,99) 35%,rgb(7,7,7) 72%,rgb(201,174,77) 75%,rgb(188,169,66) 96%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C26]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">RTLock: IP Protection using Scan-Aware Logic Locking at RTL<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Md Rafid Muttaki, Shuvagata Saha, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Fahim Rahman, Mark Tehranipoor and Farimah Farahmandi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Design, Automation and Test in Europe Conference (<strong>DATE)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Conventional logic locking techniques mainly focus on gate-level netlists to combat IP piracy and IC overproduction. However, this is generally not sufficient for protecting semantics and behaviors of the design. Further, these techniques are even more objectionable when the IC supply chain is at risk of insider threats. This paper proposes RTLock, a robust logic locking framework at the RTL abstraction. RTLock provides a detailed formal analysis of the design specs at the RTL that determines the locking candidate points w.r.t. attacks resiliency (SAT\/BMC), locking key size, and overhead. RTLock incorporates (partial) DFT infrastructure (scan chain) at the RTL, enabled with a scan locking mechanism. It allows us to push all the necessary security-driven actions to the highest abstraction level, thus making the flow EDA tool agnostic. Additionally, RTLock demonstrates why RTL-based locking must be coupled with encryption and management protocols (e.g., IEEE P1735), to be effective against insider threats. Our experimental results show that, vs. other techniques, RTLock protects the design against broader threats at low overhead and without compromising testability.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--71\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10137136\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--72\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=11318462271459288864&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-5384da4d4cc6479c56b7103b435e4744\" style=\"font-size:18px;font-style:normal;font-weight:800\">Nominated for the Best Paper Award &#8211; DATE 2023<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 11%,rgb(69,88,99) 35%,rgb(7,7,7) 72%,rgb(201,174,77) 75%,rgb(188,169,66) 96%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C25]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">EvoLUTe: Evaluation of Look-Up-Table-based Fine-Grained IP Redaction<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Rui Guo, M Sazadur Rahman, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Fahim Rahman, Farimah Farahmandi and Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Design, Automation and Test in Europe Conference <strong>(DATE)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Recent studies on intellectual property (IP) protection techniques demonstrate that engaging embedded reconfigurable components (e.g., eFPGA redaction) would be a promising approach to concealing the functional and structural information of the security-critical design. However, detailed investigation reveals that such techniques suffer from almost prohibited overhead in terms of area, power, delay, and testability. In this paper, we introduce EvoLUTe, a distinct and significantly more fine-grained redaction methodology using smaller reconfigurable components (such as look-up-tables (LUTs)). In EvoLUTe, we examine both eFPGA-based and LUT-based design spaces, demonstrating that a novel cone-based and fine-grained universal function modeling approach using LUTs is capable of providing the same degree of resiliency at a much lower area\/power\/delay and testability costs.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--73\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10137322\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--74\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=938897449016595786&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-5384da4d4cc6479c56b7103b435e4744\" style=\"font-size:18px;font-style:normal;font-weight:800\">Nominated for the Best Paper Award &#8211; DATE 2023<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C24]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">SheLL: Shrinking eFPGA Fabrics for Logic Locking<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar, Farimah Farahmandi and Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Design, Automation and Test in Europe Conference <strong>(DATE)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>The utilization of fully reconfigurable logic and routing modules may be considered as one potential and even provably resilient technique against intellectual property (IP) piracy and integrated circuits (IC) overproduction. The embedded FPGA (eFPGA) is one instance that could be used for IP redaction leading to hiding the functionality through the untrusted stages of the IC supply chain. The eFPGA architecture, albeit reliable, unnecessarily results in exploding the die size even while it is supposed to be at fine granularity targeting small modules\/IPs. In this paper, we propose SheLL, which primarily embeds the interconnects (routing channels) of the design and secondarily twists the minimal logic parts of the design into the eFPGA architecture. In SheLL, the eFPGA architecture is customized for this specific logic locking methodology, allowing us to minimize the overhead of eFPGA fabric as possible. Our experimental results demonstrate that SheLL guarantees robustness against notable attacks while the overhead is significantly lower compared to the existing eFPGA-based competitors.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--75\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10137211\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--76\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?cites=16630646405900579324&amp;as_sdt=40005&amp;sciodt=0,10&amp;hl=en\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C23]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">SecHLS: Enabling Security Awareness in High-Level Synthesis<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Shang Shi, Nitin Pundir, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Mark Tehranipoor, Farimah Farahmandi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Asia and South Pacific Design Automation Conference <strong>(ASP-DAC)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>In their quest for further optimization, High-level synthesis (HLS) utilizes advanced automatic optimization algorithms to achieve lower implementation time\/effort for even more complex designs. These optimization algorithms are for the HLS tools&#8217; backend stages, e.g., allocation, scheduling, and binding, and they are highly optimized for resources\/latency constraints. However, current HLS tools&#8217; backend is unaware of designs&#8217; security assets, and their algorithms are incapable of handling security constraints. In this paper, we propose Secure-HLS (SecHLS), which aims to define underlying security constraints for HLS tools&#8217; backend stages and intermediate representations. In SecHLS, we improve a set of widely-used scheduling and binding algorithms by integrating the proposed security-related constraints into them. We evaluate the effectiveness of SecHLS in terms of power, performance, area (PPA), security, and complexity (execution time) on small and real-size benchmarks, showing how the proposed security constraints can be integrated into HLS while maintaining low PPA\/complexity burdens.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--77\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3566097.3567926\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--78\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=2665082249770723650\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C22]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">An ISA-based Software Snippet Generation for Exploiting Hardware Vulnerabilities<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Sree Ranjani Rajendran, Shams Tarek, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Government Microcircuit Applications &amp; Critical Technology Conference <strong>(GoMACTech)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Modern Systems-on-chip (SoCs) have grown in size and complexity, giving rise to fresh concerns and susceptibilities, especially with flaws at the system level. Nevertheless, a thorough exploration of the system-level verification process, which, if breached, could result in the exploitation of hardware vulnerabilities, is still lacking. This deficiency is primarily attributed to the absence of definitive security criteria and attributes from the perspective of SoC designers. To facilitate a more comprehensive assessment of system-level characteristics, this paper introduces a framework designed to identify sequences of instructions within the processor unit (PU) that expose underlying hardware vulnerabilities. The framework streamlines various aspects, including (i) threat modeling, (ii) formal verification based on potential threats, (iii) the creation of counterexamples, and (iv) the generation of code snippets that exploit these vulnerabilities. Additionally, the framework establishes a security coverage metric (referred to as Coverage) to gauge the performance and efficiency of the proposed methodology. To demonstrate the effectiveness of the methodology, we conducted a diverse range of case studies on a RISC-V-based open-source SoC architecture, showcasing its ability to uncover Trust-HUB vulnerabilities.<\/p>\n<\/details>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C21]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">O&#8217;Clock: Lock the Clock via Clock-gating for SoC IP Protection<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">M. Sazadur Rahman, Rui Guo, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Fahim Rahman, Farimah Farahmandi, Mohamed Abdel-Moneum, Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Design Automation Conference <strong>(DAC)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Existing logic locking techniques can prevent IP piracy or tampering. However, they often come at the expense of high overhead and are gradually becoming vulnerable to emerging deobfuscation attacks. To protect SoC IPs, we propose&nbsp;<em>O&#8217;Clock<\/em>, a fully-automated clock-gating-based approach that &#8216;locks the clock&#8217; to protect IPs in complex SoCs.&nbsp;<em>O&#8217;Clock<\/em>&nbsp;obstructs data\/control flows and makes the underlying logic dysfunctional for incorrect keys by manipulating the activity factor of the clock tree.&nbsp;<em>O&#8217;Clock<\/em>&nbsp;has minimal changes to the original design and no change to the IC design flow. Our experimental results show its high resiliency against state-of-the-art de-obfuscation attacks (e.g., oracle-guided SAT, unrolling-\/BMC-based SAT, removal, and oracle-less machine learning-based attacks) at negligible power, performance, and area (PPA) overhead.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--79\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3489517.3530542\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--80\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=15135761605062340349&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 11%,rgb(69,88,99) 35%,rgb(7,7,7) 72%,rgb(201,174,77) 75%,rgb(188,169,66) 96%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C20]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Warm Up before Circuit De-obfuscation? An Exploration through Bounded-Model-Checkers<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi, Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE International Symposium on Hardware Oriented Security and Trust <strong>(HOST)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>With the emergence of numerous circuit de-obfuscation attacks, the strength of logic locking has been jeopardized in recent years. Amongst them, bounded-model-checker (BMC)-based attack on locked circuits with limited design-for-testability (DFT) access received significant attention in recent years. However, scalability is a crucial challenge in such an attack due to having two unrolling factors, namely sequential unrolling and miter duplication. This paper will explore some techniques for warming up the BMC before its main invocation to expedite the attack procedure. Our experimental results reflect that the efficacy of BMC-based attacks can be enhanced once the BMC is initiated meticulously through the studied methodologies.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--81\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9840134\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--82\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=9286768887822362362&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-4babb5ac6ce97c71ddd6da31a65688fa\" style=\"font-size:18px;font-style:normal;font-weight:800\">The Best Poster (Short Paper) Award \u2013 HOST 2022<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2022<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C19]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">RANE: An Open-Source Formal De-obfuscation Attack for Reverse Engineering of Logic Encrypted Circuits<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Shervin Roshanisefat, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Houman Homayoun, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">ACM Great Lakes Symposium on VLSI <strong>(GLSVLSI)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>To enable trust in the IC supply chain, logic locking as an IP protection technique received significant attention in recent years. Over the years, by utilizing Boolean satisfiability (SAT) solver and its derivations, many de-obfuscation attacks have undermined the security of logic locking. Nonetheless, all these attacks receive the inputs (locked circuits) in a very simplified format (Bench or remapped and translated Verilog) with many limitations. This raises the bar for the usage of the existing attacks for modeling and assessing new logic locking techniques, forcing the designers to undergo many troublesome translations and simplifications. This paper introduces the RANE Attack, an open-source CAD-based toolbox for evaluating the security of logic locking mechanisms that implement a unique interface to use formal verification tools without a need for any translation or simplification. The RANE attack not only performs better compared to the existing de-obfuscation attacks, but it can also receive the library-dependent logic-locked circuits with no limitation in written, elaborated, or synthesized standard HDL, such as Verilog. We evaluated the capability\/performance of RANE on FOUR case studies, one is the first de-obfuscation attack model on FSM locking solutions (e.g., HARPOON) in which the key is not a static bit-vector but a sequence of input patterns.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--83\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3453688.3461760\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--84\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=11700276659365130397&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2021<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C18]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">ChaoLock: Yet Another SAT-hard Logic Locking using Chaos Computing<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar, Houman Homayoun, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE International Symposium on Quality Electronic Design <strong>(ISQED)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Logic locking has been widely evaluated as a proactive countermeasure against the hardware security threats within the IC supply chain. However, the introduction of the SAT attack, and many of its derivatives, has raised big concern about this form of countermeasure. In this paper, we explore the possibility of exploiting chaos computing as a new means of logic locking. We introduce the concept of chaotic logic locking, called ChaoLock, in which, by leveraging asymmetric inputs in digital chaotic Boolean gates, we define the concept of programmability (key-configurability) to the sets of underlying initial conditions and system parameters. These initial conditions and system parameters determine the operation (functionality) of each digital chaotic Boolean gate. Also, by proposing dummy inputs in chaotic Boolean gates, we show that during reverse-engineering, the dummy inputs conceal the main functionality of the chaotic Boolean gates, which make the reverse-engineering almost impossible. By performing a security analysis of ChaoLock, we show that with no restriction on conventional CMOS-based ASIC implementation and with no test\/debug compromising, none of the state-of-the-art attacks on logic locking, including the SAT attack, could reformulate chaotic Boolean gates while dummy inputs are involved and their parameters are locked. Our analysis and experimental results show that with a low number of chaotic Boolean gates mixed with CMOS digital gates, ChaoLock can guarantee resiliency against the state-of-the-art attacks on logic locking at low overhead.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--85\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9424321\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--86\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=7441750497465059361&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2021<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 11%,rgb(69,88,99) 35%,rgb(7,7,7) 72%,rgb(201,174,77) 75%,rgb(188,169,66) 96%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C17]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">ExTru: A Lightweight, Fast, and Secure Expirable Trust for the Internet of Things<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar, Shervin Roshanisefat, Ashkan Vakil, Houman Homayoun, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Dallas Circuits and Systems Conference <strong>(IEEE DCAS 2020)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>The resource-constrained nature of the Internet of Things (IoT) edges, poses a challenge in designing a secure and high-performance communication for this family of devices. Although side-channel resistant ciphers (either block or stream) could guarantee the security of the communication, the energy intensive nature of these ciphers makes them undesirable for lightweight IoT solutions. In this paper, we introduce ExTru, an encrypted communication protocol based on stream ciphers that adds a configurable switching &amp; toggling network (CSTN) to not only boost the performance of the communication in these devices, it also consumes far less energy than the conventional side-channel resistant ciphers. Although the overall structure of the proposed scheme is leaky against physical attacks, we introduce a dynamic encryption mechanism that removes this vulnerability. We demonstrate how each communicated message in the proposed scheme reduces the level of trust. Accordingly, since a specific number of messages, N, could break the communication and extract the key, by using the dynamic encryption mechanism, ExTru can re-initiate the level of trust periodically after T messages where T &lt;; N, to protect the communication against side-channel and scan-based attacks (e.g. SAT attack). Furthermore, we demonstrate that by properly configuring the value of T, ExTru not only increases the strength of security from per \u201cdevice\u201d to per \u201cmessage\u201d, it also significantly improves energy saving as well as throughput vs. an architecture that only uses a conventional side-channel resistant block\/stream cipher.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--87\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9330632\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--88\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;authuser=2&amp;cites=16702374683377163886\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-5cbcbe40ffc0b6b1ee24ef1e0860f4f5\" style=\"font-size:18px;font-style:normal;font-weight:800\">The Best Paper Award \u2013 DCAS 2020<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2020<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C16]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">NNgSAT: Neural Network guided SAT Attack on Logic Locked Complex Structures<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Houman Homayoun, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">International Conference On Computer Aided Design<strong> (ICCAD)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>The globalization of the IC supply chain has raised many security threats, especially when untrusted parties are involved. This has created a demand for a dependable logic obfuscation solution to combat these threats. Amongst a wide range of threats and countermeasures on logic obfuscation in the 2010s decade, the Boolean satisfiability (SAT) attack, or one of its derivatives, could break almost all state-of-the-art logic obfuscation countermeasures. However, in some cases, particularly when the logic locked circuits contain complex structures, such as big multipliers, large routing networks, or big tree structures, the logic locked circuit is hard-to-be-solved for the SAT attack. Usage of these structures for obfuscation may lead a strong defense, as many SAT solvers fail to handle such complexity. However, in this paper, we propose a neural-network-guided SAT attack (NNgSAT), in which we examine the capability and effectiveness of a message-passing neural network (MPNN) for solving these complex structures (SAT-hard instances). In NNgSAT, after being trained as a classifier to predict SAT\/UNSAT on a SAT problem (NN serves as a SAT solver), the neural network is used to guide\/help the actual SAT solver for finding the SAT assignment(s). By training NN on conjunctive normal forms (CNFs) corresponded to a dataset of logic locked circuits, as well as fine-tuning the confidence rate of the NN prediction, our experiments show that NNgSAT could solve 93.5% of the logic locked circuits containing complex structures within a reasonable time, while the existing SAT attack cannot proceed the attack flow in them.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--89\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3400302.3415669\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--90\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?cites=9526228870970579474&amp;as_sdt=40005&amp;sciodt=0,10&amp;hl=en\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2020<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C15]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">InterLock: An Intercorrelated Logic And Routing Locking<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar, Houman Homayoun, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">International Conference On Computer Aided Design<strong> (ICCAD)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>In this paper, we propose a&nbsp;<em>canonical prune-and-SAT<\/em>&nbsp;(<em>CP&amp;SAT<\/em>) attack for breaking state-of-the-art routing-based obfuscation techniques. In the&nbsp;<em>CP&amp;SAT<\/em>&nbsp;attack, we first encode the key-programmable routing blocks (keyRBs) based on an efficient SAT encoding mechanism suited for detailed routing constraints, and then efficiently re-encode and reduce the CNF corresponded to the keyRB using a bounded variable addition (BVA) algorithm. In the&nbsp;<em>CP&amp;SAT<\/em>&nbsp;attack, this is done before subjecting the circuit to the SAT attack. We illustrate that this encoding and BVA-based pre-processing significantly reduces the size of the CNF corresponded to the routing-based obfuscated circuit, in the result of which we observe 100% success rate for breaking prior art routing-based obfuscation techniques. Further, we propose a new&nbsp;<em>intercorrelated logic and routing locking<\/em>&nbsp;technique, or in short&nbsp;<em>InterLock<\/em>, as a countermeasure to mitigate the CP&amp;SAT attack. In Interlock, in addition to hiding the connectivity, a part of the logic (gates) in the selected timing paths are also implemented in the keyRB(s). We illustrate that when the logic gates are twisted with keyRBs, the BVA could not provide any advantage as a pre-processing step. Our experimental results show that, by using InterLock, with only three 8\u00d78 or only two 16\u00d716 keyRBs (twisted with actual logic gates), the resilience against existing attacks as well as our new proposed&nbsp;<em>CP&amp;SAT<\/em>&nbsp;attack would be guaranteed while, on average, the delay\/area overhead is less than 10% for even medium-size benchmark circuits.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--91\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3400302.3415667\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--92\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?cites=5363259709823986994&amp;as_sdt=40005&amp;sciodt=0,10&amp;hl=en\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2020<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C14]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">On Designing Secure and Robust Scan Chain for Protecting Obfuscated Logic<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar, Houman Homayoun, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">ACM Great Lakes Symposium on VLSI <strong>(GLSVLSI)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>In this paper, we assess the security and testability of the state-of-the-art design-for-security (DFS) architectures in the presence of scan-chain locking\/obfuscation, a group of solution that has previously proposed to restrict unauthorized access to the scan chain. We discuss the key leakage vulnerability in the recently published prior-art DFS architectures. This leakage relies on the potential glitches in the DFS architecture that could lead the adversary to make a leakage condition in the circuit. Also, we demonstrate that the state-of-the-art DFS architectures impose some substantial architectural drawbacks that moderately affect both test flow and design constraints. We propose a new DFS architecture for building a secure scan chain architecture while addressing the potential of key leakage. The proposed architecture allows the designer to perform the structural test with no limitation, enabling an untrusted foundry to utilize the scan chain for manufacturing fault testing without having a need to access the scan chain. Our proposed solution poses negligible limitation\/overhead on the test flow, as well as the design criteria.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--93\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3386263.3407655\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--94\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?cites=7504533345658303852&amp;as_sdt=40005&amp;sciodt=0,10&amp;hl=en\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2020<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 11%,rgb(69,88,99) 35%,rgb(7,7,7) 72%,rgb(201,174,77) 75%,rgb(188,169,66) 96%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C13]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">SCRAMBLE: The State, Connectivity and Routing Augmentation Model for Building Logic Encryption<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar, Houman Homayoun, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Computer Society Annual Symposium on VLSI <strong>(ISVLSI)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>In this paper, we introduce SCRAMBLE, as a novel logic locking solution for sequential circuits while the access to the scan chain is restricted. The SCRAMBLE could be used to lock an FSM by hiding its state transition graph (STG) among a large number of key-controlled false transitions. Also, it could be used to lock sequential circuits (sequential datapath) by hiding the timing paths&#8217; connectivity among a large number of key-controlled false connections. Besides, the structure of SCRAMBLE allows us to engage this scheme as a new scan chain locking solution by hiding the correct scan chain sequence among a large number of the key-controlled false sequences. We demonstrate that the proposed scheme resists against both (1) the 2-stage attacks on FSM, and (2) SAT attacks integrated with unrolling as well as bounded-model checking. We have discussed two variants of SCRAMBLE: (I) Connectivity SCRAMBLE (SCRAMBLE-C), and (b) Logic SCRAMBLE (SCRAMBLE-L). The SCRAMBLE-C relies on the SAT-hard and key-controlled modules that are built using near non-blocking logarithmic switching networks. The SCRAMBLE-L uses input multiplexing techniques to hide a part of the FSM in a memory. In the result section, we describe the effectiveness of each variant against state-of-the-art attacks.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--95\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9154980\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--96\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=5909552057518008211&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-a5db4b80dd1f4265d2cabb8950628c96\" style=\"font-size:18px;font-style:normal;font-weight:800\">Nominated for the Best Paper Award \u2013 ISVLSI 2020<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2020<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C12]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">DFSSD: Deep Faults and Shallow State Duality, A Provably Strong Obfuscation Solution for Circuits with Restricted Access to Scan Chain<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Shervin Roshanisefat, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar, Sai Manoj Pudukotai Dinakarrao, Naghmeh Karimi, Houman Homayoun, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE VLSI Test Symposium <strong>(VTS 2020)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>In this paper, we introduce DFSSD, a novel logic locking solution for sequential and FSM circuits with a restricted (locked) access to the scan chain. DFSSD combines two techniques for obfuscation: (1) Deep Faults, and (2) Shallow State Duality. Both techniques are specifically designed to resist against sequential SAT attacks based on bounded model checking. The shallow state duality prevents a sequential SAT attack from taking a shortcut for early termination without running an exhaustive unbounded model checker to assess if the attack could be terminated. The deep fault, on the other hand, provides a designer with a technique for building deep, yet key recoverable faults that could not be discovered by sequential SAT (and bounded model checker based) attacks in a reasonable time.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--97\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9107629\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--98\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=5391831482413213497&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2020<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 11%,rgb(69,88,99) 35%,rgb(7,7,7) 72%,rgb(201,174,77) 75%,rgb(188,169,66) 96%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C11]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Security and Complexity Analysis of LUT-based Obfuscation: From Blueprint to Reality<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Gaurav Kolhe, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Miklesh Naicker, Tyler David Sheaves, Setareh Rafatirad, Avesta Sasan, Sai Manoj Pudukotai Dinakarrao, Hamid Mahmoodi, Houman Homayoun<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">International Conference On Computer Aided Design <strong>(ICCAD)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Recent obfuscation schemes have leveraged reconfigurable logics to alleviate various hardware security threats. However, existing reconfigurable logic-based obfuscation schemes focus on specific design factors such as gate replacement strategy or an optimization metric such as SAT-hardness. Despite meeting the focused metrics such as security, the obfuscation also incurs overheads, which are not well analyzed in the existing works. In this work, we provide a comprehensive analysis on reconfigurable logic obfuscation schemes i.e., LUT-based obfuscation by investigating 3-key design factors such as (1) LUT size, (2) number of LUTs, and (3) replacement strategy as they have a considerable impact on design criteria, i.e., Power-Performance-Area (PPA) and Security (PPA\/S). Our results show that among the studied parameters the size of LUT has the most prominent impact on improving the resiliency of LUT-based obfuscation against the SAT and removal attacks. However, using large size LUTs incur significant PPA overheads, making such solutions unfeasible and unpractical. To address this challenge, this work proposes a pragmatic solution based on a customized LUT, where the security provided by each LUT is superior to that of traditional LUT-based obfuscation. The proposed solution primarily benefits from LUT-based obfuscation reinforced with additional logic\/routing obfuscation that is implemented using small 2-input LUTs. We evaluate the hardware security and overhead of the proposed customized LUT-based obfuscation on various benchmarks to prove that the customized LUT-based obfuscation breaks the PPA tradeoffs while exhibiting robustness against the SAT and removal attacks. The customized LUT-based obfuscation comes with 8\u00d7 reduced area and 2\u00d7 reduced power on an average compared to state-of-the-art LUT-based obfuscation without compromising security.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--99\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8942100\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--100\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=14337191579344869291&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-d3d5d40fc23a819c5fe9bac032944b01\" style=\"font-size:18px;font-style:normal;font-weight:800\">Nominated for the Best Paper Award &#8211; ICCAD 2019<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2019<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C10]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">COMA: Communication and Obfuscation Management Architecture<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Kimia Azar, Farnoud Farahmand, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">International Symposium on Research in Attacks, Intrusions and Defenses <strong>(RAID)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>In this paper, we introduce a novel Communication and Obfuscation Management Architecture (COMA) to handle the storage of the obfuscation key and to secure the communication to\/from untrusted yet obfuscated circuits. COMA addresses three challenges related to the obfuscated circuits: First, it removes the need for the storage of the obfuscation unlock key at the untrusted chip. Second, it implements a mechanism by which the key sent for unlocking an obfuscated circuit changes after each activation (even for the same device), transforming the key into a dynamically changing license. Third, it protects the communication to\/from the COMA protected device and additionally introduces two novel mechanisms for the exchange of data to\/from COMA protected architectures: (1) a highly secure but slow double encryption, which is used for exchange of key and sensitive data (2) a high-performance and low-energy yet leaky encryption, secured by means of frequent key renewal. We demonstrate that compared to state-of-the-art key management architectures, COMA reduces the area overhead by 14%, while allowing additional features including unique chip authentication, enabling activation as a service (for IoT devices), reducing the side channel attack on key management architecture, and providing two new means of the secure communication to\/from an COMA-secured untrusted chip.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--101\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/www.usenix.org\/conference\/raid2019\/presentation\/azar\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--102\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=7119966588461239883&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2019<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C9]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Muffin: Minimally-Buffered Zero-Delay Power-Gating Technique in On-Chip Routers<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Hossein Farrokhbakht, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Natalie Enright Jerger<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">International Symposium on Low Power Electronics and Design <strong>(ISLPED)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Although conventional Network-on-Chip (NoC) designs provide high bandwidth, many modern applications for many-core architectures have significant periods of low NoC utilization. Highly provisioned NoCs provide the required performance during periods of high activity; yet, large NoC designs come with high power costs. Furthermore, as technology shrinks, the contribution of static power increases. Hence, numerous NoC power-gating techniques have been proposed to alleviate the growing contribution of static power. However, the efficiency of power-gating techniques decreases due to sporadic packet arrivals across a range of injection rates. In this paper, we propose Minimally-Buffered Router Infrastructure (Muffin), which increases the number of traversals that can be made without needing to power on the routers. Empirical results on SPLASH-2 show that, compared to conventional power-gating scheme, Muffin improves static power consumption by an average of 95.4%, while improving the average packet latency by 73.7%.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--103\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8824806\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--104\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=13496915900892660265&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2019<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C8]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Full-Lock: Hard Distributions of SAT instances for Obfuscating Circuits using Fully Configurable Logic and Routing Blocks<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar, Houman Homayoun, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Design Automation Conference <strong>(DAC)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>In this paper, we propose a novel and SAT-resistant logic-locking technique, denoted as Full-Lock, to obfuscate and protect the hardware against threats including IP-piracy and reverse-engineering. The Full-Lock is constructed using a set of small-size fully Programmable Logic and Routing block (PLR) networks. The PLRs are SAT-hard instances with reasonable power, performance and area overheads which are used to obfuscate (1) the routing of a group of selected wires and (2) the logic of the gates leading and proceeding the selected wires. The Full-Lock resists removal attacks and breaks a SAT attack by significantly increasing the complexity of each SAT iteration.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--105\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3316781.3317831\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--106\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=18289284442880585011&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2019<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C7]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Threats on Logic Locking: A Decade Later<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Houman Homayoun, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">ACM Great Lakes Symposium on VLSI <strong>(GLSVLSI)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>To reduce the cost of ICs and to meet the market&#8217;s demand, a considerable portion of manufacturing supply chain, including silicon fabrication, packaging and testing may be pushed offshore. Utilizing a global IC manufacturing supply chain, and inclusion of non-trusted parties in the supply chain has raised concerns over security and trust related challenges including those of overproduction, counterfeiting, IP piracy, and Hardware Trojans to name a few. To reduce the risk of IC manufacturing in an untrusted and globally distributed supply chain, the researchers have proposed various locking and obfuscation mechanisms for hiding the functionality of the ICs during the manufacturing, that requires the activation of the IP after fabrication using the key value(s) that is only known to the IP\/IC owner. At the same time, many such proposed obfuscation and locking mechanisms are broken with attacks that exploit the inherent vulnerabilities in such solutions. The past decade of research in this area, has resulted in many such defense and attack solutions. In this paper, we review a decade of research on hardware obfuscation from an attacker perspective, elaborate on attack and defense lessons learned, and discuss future directions that could be exploited for building stronger defenses.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--107\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3299874.3319495\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--108\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?cites=6983248798957607362&amp;as_sdt=40005&amp;sciodt=0,10&amp;hl=en\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2019<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C6]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">LUT-Lock: A Novel LUT-Based Logic Obfuscation for FPGA-Bitstream and ASIC-Hardware Protection<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Kimia Azar, Kris Gaj, Houman Homayoun, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE Computer Society Annual Symposium on VLSI <strong>(ISVLSI)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>In this work, we propose LUT-Lock, a novel Look-Up-Table-based netlist obfuscation algorithm, for protecting the intellectual property that is mapped to an FPGA bitstream or an ASIC netlist. We, first, illustrate the effectiveness of several key features that make the LUT-based obfuscation more resilient against SAT attacks and then we embed the proposed key features into our proposed LUT-Lock algorithm. We illustrate that LUT-Lock maximizes the resiliency of the LUT-based obfuscation against SAT attacks by forcing a near exponential increase in the execution time of a SAT solver with respect to the number of obfuscated gates. Hence, by adopting LUT-Lock algorithm, SAT attack execution time could be made unreasonably long by increasing the number of utilized LUTs.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--109\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8429401\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--110\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=15701551032610270209&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2018<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C5]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">SPONGE: A Scalable Pivot-based On\/Off Gating Engine for Reducing Static Power in NoC Routers<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Hossein Farrokhbakht, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Natalie Enright Jerger, Shaahin Hessabi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">International Symposium on Low Power Electronics and Design <strong>(ISLPED)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Due to high aggregate idle time of Networks-on-Chip (NoCs) routers in practical applications, power-gating techniques have been proposed to combat the ever-increasing ratio of static power. Nevertheless, the sporadic packet arrivals compromise the effectiveness of power-gating by incurring significant latency and energy overhead. In this paper, we propose a Scalable Pivot-based On\/Off Gating Engine (SPONGE) which efficiently manages power-gating decisions and routing mechanism by adaptively selecting a small set of powered-on columns of routers and keeping the others in power-gated state. To this end, a router architecture augmented with a novel routing algorithm is proposed in which a packet can traverse powered-off routers without waking them up, and can only turn in predetermined powered-on routers. Experimental results on SPLASH-2 benchmarks demonstrate that, compared to the conventional power-gating method, SPONGE on average not only improves static power consumption by 81.7%, it also improves average packet latency by 63%.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--111\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3218603.3218635\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--112\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=996978859357693539&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2018<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C4]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">SRCLock: SAT-Resistant Cyclic Logic Locking for Protecting the Hardware<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Shervin Roshanisefat, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">ACM Great Lakes Symposium on VLSI <strong>(GLSVLSI)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>In this paper, we claim that cyclic obfuscation, when properly implemented, poses exponential complexity on SAT or CycSAT attack. The CycSAT, in order to generate the necessary cycle avoidance clauses, uses a pre-processing step. We show that this pre-processing step has to compose its cycle avoidance condition on all cycles in a netlist, otherwise, a missing cycle could trap the SAT solver in an infinite loop or force it to return an incorrect key. Then, we propose several techniques by which the number of cycles is exponentially increased with respect to the number of inserted feedbacks. We further illustrate that when the number of feedbacks is increased, the pre-processing step of CycSAT faces an exponential increase in complexity and runtime, preventing the correct composition of loop avoidance clauses in a reasonable time before invoking the SAT solver. On the other hand, if the pre-processing is not completed properly, the SAT solver will get stuck or return incorrect key. Hence, when the cyclic obfuscation in accordance to the conditions proposed in this paper is implemented, it would impose an exponential complexity with respect to the number of inserted feedback, even when the CycSAT solution is used.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--113\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3194554.3194596\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--114\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=2922171237971110448&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2018<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C3]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">MUCH-SWIFT: A High-Throughput Multi-Core HW\/SW Co-design K-means Clustering Architecture<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Avesta Sasan<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">ACM Great Lakes Symposium on VLSI <strong>(GLSVLSI)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>K-mean clustering is an essential tool for many big data applications including data mining, predictive analysis, forecasting studies, and machine learning. However, due to large size (volume) of Big-Data, and large dimensionality of its data points, even the application of a simple k-mean clustering may become extremely time and resource demanding. In this paper, we propose a two-level filtering algorithm based on binary kd-tree structure, which considerably decreases the time of convergence in K-means algorithm for large datasets. The proposed modification to the classification algorithm, evolves the SW to naturally divide the classification into smaller data sets, based on the number of available cores and size of logic available in an FPGA. The empirical results show that on a multi-core FPGA, provides 330x speed-up compared to a conventional SW-only solution.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--115\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3194554.3194648\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--116\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=1942121104161422669,4907197739209640865&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2018<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C2]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">SMART: A Scalable Mapping And Routing Technique for Power-Gating in NoC Routers<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Hossein Farrokhbakht, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Shaahin Hessabi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">IEEE\/ACM International Symposium on Networks-on-Chip <strong>(NOCS)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Reducing the size of the technology increases leakage power in Network-on-Chip (NoC) routers drastically. Power-gating, particularly in NoC routers, is one of the most efficient approaches for alleviating the leakage power. Although applying power-gating techniques alleviates NoC power consumption due to high proportion of idleness in NoC routers, since the timing behavior of packets is irregular, even in low injection rates, performance overhead in power-gated routers is significant. In this paper, we present SMART, a Scalable Mapping And Routing Technique, with virtually no area overhead on the network. It improves the irregularity of the timing behavior of packets in order to mitigate leakage power and lighten the imposed performance overhead. SMART employs a special deterministic routing algorithm, which reduces number of packets encounter power-gated routers. It establishes a dedicated path between each source-destination pair to maximize using powered-on routers, which roughly halves the number of wake-ups. Additionally, in order to maximize the efficiency of the proposed routing algorithm, SMART provides an exclusive mapping for each communication task graph. In proposed mapping, all cores should be arranged with a special layout suited for the proposed routing, which helps us to minimize the number of hops. Furthermore, we modify the predictor of conventional power-gating technique to reduce energy overhead of inconsistent wake-ups. Experimental results on SPLASH-2 benchmarks indicate that the proposed technique can save 21.9% of static power, and reduce the latency overhead by 42.9% compared with the conventional power-gating technique.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--117\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3130218.3130231\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--118\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=1906039168163824788&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2017<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(7,7,7) 0%,rgb(61,82,96) 23%,rgb(69,88,99) 69%,rgb(7,7,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[C1]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">AdapNoC: A Fast and Flexible FPGA-based NoC Simulator<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Shaahin Hessabi<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">International Conference on Field Programmable Logic and Applications <strong>(FPL)<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Network on Chip (NoC) is the most common interconnection platform for multiprocessor systems-on-chips (MPSoCs). In order to explore the design space of this platform, we need a high-speed, cycle-accurate, and flexible simulation tool. In this paper, we present AdapNoC, a configurable cycle-accurate FPGA-based NoC simulator, which can be configured via software. A wide range of parameters are configurable in FPGA side of the proposed simulator, and the software side is implemented on an embedded soft-core processor. We transfer some parts of simulator, such as Traffic Generators (TGs) and Traffic Receptors (TRs), to software side without any degradation in simulation speed. Moreover, we implement a dual-clock architecture as an innovation in virtualization methodology, which is also capable to share idle time-slots, which helps not only simulate bigger NoCs, but also reduce simulation time drastically. Also, by employing a traffic aggregator architecture, AdapNoC provides table-based adaptive routing algorithm as a configurable parameter in router microarchitecture. We evaluate simulation time of AdapNoC by using Xilinx Virtex-6 XC6VLX240T, and demonstrate 53x\u2013180x speed-up against BOOKSIM. Also, due to our proposed virtualization, and TGs and TRs migration to software side, we can implement a 64-node non-virtualized or a 1024-node virtualized mesh network in only %72 of Xilinx Virtex-6 XC6VLX240T resources.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--119\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7577377\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--120\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=3168842148083500580&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2016<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-roboto-slab-font-family\" style=\"padding-top:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40);font-size:25px\">Non-Refereed Articles [3 Articles]<\/h2>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(67,53,77) 16%,rgb(68,33,81) 41%,rgb(72,38,91) 68%,rgb(4,2,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[NR3]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Advances in Logic Locking: Past, Present, and Prospects<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\">Kimia Azar, <strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong>, Farimah Farahmandi, Mark Tehranipoor<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Cryptology ePrint Archive<\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-a82cdeddaa3d277cb7f2eec73ca3c48c\" style=\"font-size:14px;font-style:normal;font-weight:100\">Logic locking is a design concealment mechanism for protecting the IPs integrated into modern System-on-Chip (SoC) architectures from a wide range of hardware security threats at the IC manufacturing supply chain. Logic locking primarily helps the designer to protect the IPs against reverse engineering, IP piracy, overproduction, and unauthorized activation. For more than a decade, the research studies that carried out on this paradigm has been immense, in which the applicability, feasibility, and efficacy of the logic locking have been investigated, including metrics to assess the efficacy, impact of locking in different levels of abstraction, threat model definition, resiliency against physical attacks, tampering, and the application of machine learning. However, the security and strength of existing logic locking techniques have been constantly questioned by sophisticated logical and physical attacks that evolve in sophistication at the same rate as logic locking countermeasure approaches. By providing a comprehensive definition regarding the metrics, assumptions, and principles of logic locking, in this survey paper, we categorize the existing defenses and attacks to capture the most benefit from the logic locking techniques for IP protection, and illuminating the need for and giving direction to future research studies in this topic. This survey paper serves as a guide to quickly navigate and identify the state-of-the-art that should be considered and investigated for further studies on logic locking techniques, helping IP vendors, SoC designers, and researchers to be informed of the principles, fundamentals, and properties of logic locking.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--121\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/eprint.iacr.org\/2022\/260\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--122\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=6406856226976904958,15085896818125679383\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2022<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(67,53,77) 16%,rgb(68,33,81) 41%,rgb(72,38,91) 68%,rgb(4,2,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[NR2]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Secure and Robust Key-Trapped Design-for-Security Architecture for Protecting Obfuscated Logic<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong><\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">Cryptology ePrint Archive<\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-5d7b7af65150d5f6b8f9e0ed85c00f65\" style=\"font-size:14px;font-style:normal;font-weight:100\">Having access to the scan chain of Integrated Circuits (ICs) is an integral requirement of the debug\/testability process within the supply chain. However, the access to the scan chain raises big concerns regarding the security of the chip, particularly when the secret information, such as the key of logic obfuscation, is embedded\/stored inside the chip. Hence, to relieve such concerns, numerous secure scan chain architectures have been proposed in the literature to show not only how to prevent any unauthorized access to the scan chain but also how to keep the availability of the scan chain for debug\/testability. In this paper, we first provide a holistic overview of all secure scan chain architectures. Then, we discuss the key leakage possibility and some substantial architectural drawbacks that moderately affect both test flow and design constraints in the state-of-the-art published design-for-security (DFS) architectures. Then, we propose a new key-trapped DFS (kt-DFS) architecture for building a secure scan chain architecture while addressing the potential of key leakage. The proposed kt-DFS architecture allows the designer to perform the structural test with no limitation, enabling an untrusted foundry to utilize the scan chain for manufacturing fault testing without needing to access the scan chain. Finally, we evaluate and compare the proposed architecture with state-of-the-art ones in terms of security, testability time and complexity, and area\/power\/delay overhead.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--123\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/eprint.iacr.org\/2022\/801\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--124\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;authuser=2&amp;cites=17378265380431517486&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2022<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(0,0,0) 0%,rgb(67,53,77) 16%,rgb(68,33,81) 41%,rgb(72,38,91) 68%,rgb(4,2,7) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:7%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">[NR1]<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:88%\">\n<h2 class=\"wp-block-heading has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">Using Multi-Core HW\/SW Co-design Architecture for Accelerating K-means Clustering Algorithm<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:14px;font-style:normal;font-weight:200;line-height:1\"><strong><span style=\"text-decoration: underline;\">Hadi Kamali<\/span><\/strong><\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-roboto-slab-font-family\" style=\"font-size:15px;line-height:1\">ACM Journal on Emerging Technologies in Computing Systems (<strong>ACM JETC<\/strong>), 2018.<\/p>\n\n\n\n<details class=\"wp-block-details has-white-color has-text-color has-small-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p class=\"is-style-outline has-white-color has-text-color has-link-color has-roboto-slab-font-family wp-elements-e910233877e58e3f9c14c38cc026db34\" style=\"font-size:14px;font-style:normal;font-weight:100\">The capability of classifying and clustering a desired set of data is an essential part of building knowledge from data. However, as the size and dimensionality of input data increases, the run-time for such clustering algorithms is expected to grow superlinearly, making it a big challenge when dealing with BigData. K-mean clustering is an essential tool for many big data applications including data mining, predictive analysis, forecasting studies, and machine learning. However, due to large size (volume) of Big-Data, and large dimensionality of its data points, even the application of a simple k-mean clustering may become extremely time and resource demanding. Specially when it is necessary to have a fast and modular dataset analysis flow. In this paper, we demonstrate that using a two-level filtering algorithm based on binary kd-tree structure is able to decrease the time of convergence in K-means algorithm for large datasets. The two-level filtering algorithm based on binary kd-tree structure evolves the SW to naturally divide the classification into smaller data sets, based on the number of available cores and size of logic available in a target FPGA. The empirical result on this two-level structure over multi-core FPGA-based architecture provides 330X speed-up compared to a conventional software-only solution.<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--125\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/arxiv.org\/abs\/1807.09250\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Online Version<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--126\"><a class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color has-roboto-slab-font-family has-custom-font-size wp-element-button\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=282813095289119497&amp;as_sdt=5\" style=\"font-size:14px\" target=\"_blank\" rel=\"noreferrer noopener\">Cited by<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\">\n<p class=\"has-roboto-slab-font-family\" style=\"font-size:16px;font-style:normal;font-weight:700\">2018<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"You can find the latest updates of publications here in Google Scholar Profile! 2 Books 1 Book Chapters 6 Pending\/Issued Patents 15 Journals 49 Conferences 3 Abstract\/NonRefereed Books [2 Books] [B2] Hardware Security: A Look into the Future Mark Tehranipoor, Kimia Azar, Hadi Kamali, Navid Asadizanjani, Fahim Rahman, Farimah Farahmandi Springer Nature. 2024 [B1] Understanding&hellip;","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-98","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/pages\/98","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/comments?post=98"}],"version-history":[{"count":107,"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/pages\/98\/revisions"}],"predecessor-version":[{"id":991,"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/pages\/98\/revisions\/991"}],"wp:attachment":[{"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/media?parent=98"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}