Open-source Codes/Artifacts
Hide & Seek: Seeking the (Un)-Hidden key in Provably-Secure Logic Locking Techniques [ LINK ]
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning [ LINK]
Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques [ LINK ]
DETERRENT: Detecting Trojans Using Reinforcement Learning [ LINK ]
MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction [ LINK ]
UNTANGLE: Unlocking Routing and Logic Obfuscation Using Graph Neural Networks-based Link Prediction [ LINK ]
OMLA: An Oracle-less Machine Learning-based Attack on Logic Locking [ LINK ]
GNN-RE: Graph Neural Networks for Reverse Engineering of Gate-Level Netlists [ LINK ]
GNNUnlock+: A Systematic Methodology for Designing Graph Neural Networks-based Oracle-less Unlocking Schemes for Provably Secure Logic Locking [ LINK ]
UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking [ LINK ]
Concerted Wire Lifting: Enabling Secure and Cost-Effective Split Manufacturing [ LINK ]
Deep Learning Analysis for Split Manufactured Layouts with Routing Perturbation [ LINK ]
2.5D Root of Trust: Secure System-Level Integration of Untrusted Chiplets [ LINK ]
A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects [ LINK ]
Toward Physically Unclonable Functions from Plasmonics-Enhanced Silicon Disc Resonators [ LINK ]
Spin-Orbit Torque Devices for Hardware Security: From Deterministic to Probabilistic Regime [ LINK ]
Useful Tools for Split Manufacturing [ LINK ]