• All Solutions All Solutions Caret
    • Editage

      One platform for all researcher needs

    • Paperpal

      AI-powered academic writing assistant

    • R Discovery

      Your #1 AI companion for literature search

    • Mind the Graph

      AI tool for graphics, illustrations, and artwork

    • Journal finder

      AI-powered journal recommender

    Unlock unlimited use of all AI tools with the Editage Plus membership.

    Explore Editage Plus
  • Support All Solutions Support
    discovery@researcher.life
Discovery Logo
Sign In
Paper
Search Paper
Cancel
Pricing Sign In
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Citation Generator iconCitation Generator
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
Discovery Logo menuClose menu
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Citation Generator iconCitation Generator
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link

Related Topics

  • Hardware Trojan Detection
  • Hardware Trojan Detection
  • Logic Encryption
  • Logic Encryption
  • Hardware Trojan
  • Hardware Trojan
  • SAT Attack
  • SAT Attack

Articles published on Logic locking

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
58 Search results
Sort by
Recency
  • Research Article
  • 10.1109/tvlsi.2025.3556241
Implementing Homomorphic Encryption-Based Logic Locking in System-On-Chip Designs
  • Jul 1, 2025
  • IEEE Transactions on Very Large Scale Integration (VLSI) Systems
  • Ziyang Ye + 1 more

Implementing Homomorphic Encryption-Based Logic Locking in System-On-Chip Designs

  • Research Article
  • 10.63313/cs.8015
PrimLock: Leveraging Linear Programming to Optimize Primitive Logic Locking
  • May 30, 2025
  • 计算机科学辑要
  • Faisal Rasheed + 2 more

This paper presents PrimLock, a logic locking framework that employs integer linear programming (ILP) to optimize key gate placement in integrated circuits (ICs), addressing vulnerabilities like IP theft and hardware Trojans in untrusted supply chains. Existing methods suffer from heuristic key placement, scalability limitations, and susceptibility to SAT attacks. PrimLock introduces a du-al-circuit ILP model that maximizes output corruption under incorrect keys while minimizing computational overhead. A standardized security metric quantifies resilience as the percentage of corrupted outputs, validated on the C17 benchmark. Results show 100% corruption in critical test cases, out-per-forming heuristic and SAT-resistant approaches. Constraint reduction tech-niques reduce computational complexity significantly, enabling scalability to industrial designs. This work establishes a mathematically rigorous founda-tion for logic locking, balancing provable security with practical efficiency.

  • Research Article
  • 10.1007/s10836-025-06171-9
Logic Locking Based Configurable Obfuscation Cell for Enhanced IC Security
  • Apr 1, 2025
  • Journal of Electronic Testing
  • K N Baluprithviraj + 2 more

Logic Locking Based Configurable Obfuscation Cell for Enhanced IC Security

  • Research Article
  • 10.30574/ijsra.2025.14.3.0644
A survey on AI-augmented Secure RTL design for hardware trojan prevention
  • Mar 30, 2025
  • International Journal of Science and Research Archive
  • Raj Parikh + 1 more

Once, discrete circuit elements, called components, were heaped up on boards inside steel cages using wire-lead technology in just five short years. Fast forward to today, and your computer CPU fits about half an inch square on a chip. Both this constant miniaturization of electronic circuits and the rapid growth in the prevalence of third-party intellectual property parts have made hardware protection more worrisome than ever. Among all these issues, Hardware Trojans (HTs)—which represent corrupted or harmful additions during various design and fabrication stages—pose significant threats to system integrity, privacy of data, and essential infrastructure. Recent studies have investigated machine learning (ML) and artificial intelligence (AI) techniques designed to enable Hardware Trojans to be found, located, and eliminated in all stages from the register transfer level (RTL) and beyond. This survey gives an in-depth look at how AI can enhance RTL security. It classifies these AI-based techniques into four main categories: Graph-Based Techniques GNNs, for instance, can be used to estimate the topology of circuits, extract structural characteristics, and thus find where some corruption has occurred. The SALTY framework applies Jumping-Knowledge GNNs to improve the accuracy location for hardware Trojans. Deep Learning in Side-Channel and Power-Analysis Techniques Deep learning methods—such as Siamese Neural Networks (SNNs) and Long Short-Term Memory (LSTM) models—have been developed to detect abnormalities brought about by Trojans in power consumption or electromagnetic (EM) radiation, granting non-invasive practices clear security benefits. Studies show that these techniques are superior to the traditional golden-model side-channel detection techniques. Machine Learning Analysis of RTL Code: In conjunction with AI, research teams are now building nearest-neighbor classifiers and decision trees and using reinforcement learning (RL) to recognize occurrences of Trojans inside RTL code. Some research uses Verilog/VHDL conditional statements as features for ML, making it possible for early warning signals to be effectively detected and introducing a proactive security mechanism during the design phase. Comprehensive Security Measures and Logic Locking: A step-by-step methodology has evolved for prevention measures such as logic locking and layout hardening, which aims against a splendid prospect within reach. The TroLLoc framework uses logic obfuscation combined with security-aware placement and routing, thus mitigating security exposures post-design. However, comprehensive studies point out several outstanding problems: key recovery attacks and unintended data leakage related to security in logic locking. In this way, the paper evaluates various AI-driven security strategies in an organized, facilitative manner, thereby highlighting significant challenges and proposing future research directions.

  • Research Article
  • 10.1145/3709139
SRLL: Improving Security and Reliability with User-Defined Constraint-Aware Logic Locking
  • Jan 31, 2025
  • ACM Journal on Emerging Technologies in Computing Systems
  • Mona Hashemi + 2 more

As chip fabrication costs rise, designers have shifted to a fabless and outsourced development model which opens up the possibility for IP piracy. To address these challenges, logic locking methods modify designs to limit functionality to authorized users that present a valid secret key. However, existing techniques often face limitations in resilience against advanced attacks and do not provide solutions to achieve user-defined constraints and goals. In this article, we propose SRLL, a user-defined constraint-aware logic locking technique that aims to improve the security and reliability of hardware designs. SRLL bridges the gap between exact and approximate attacks and allows the user to balance the resiliency against satisfiability-based, machine-learning-based, and constant propagation attacks while securing design constraints provided by the user. To enable this, we limit the locking functions to the non-critical path components and insert key gates at specific nodes, introducing a new set of critical parameters specifically designed to prevent target attacks. Finally, we obfuscate the netlist to hide inserted key gates and locking functions. Results show that SRLL maintains strong resiliency by exponentially increasing the required number of distinguishing input patterns, the complexity of finding these patterns, and adding sufficient structural complexity to the design. We evaluate SRLL using ISCAS ’85, MCNC ’91, and ITC ’99 benchmarks, demonstrating resiliency with low overhead against modern attacks, including SAT, AppSAT, OMLA, SAIL, and SCOPE.

  • Research Article
  • Cite Count Icon 1
  • 10.1587/elex.22.20250229
DCLL: Depth-coupling Based Approach On Logic Locking
  • Jan 1, 2025
  • IEICE Electronics Express
  • Danpeng Liao + 5 more

DCLL: Depth-coupling Based Approach On Logic Locking

  • Research Article
  • 10.1109/access.2025.3598581
FeSATLock: An Energy Efficient and SAT Attack Resilient Logic Locking Design with FeFET LUT Architecture for Enhanced Hardware Security
  • Jan 1, 2025
  • IEEE Access
  • Tirumala Rao Kadiyam + 5 more

FeSATLock: An Energy Efficient and SAT Attack Resilient Logic Locking Design with FeFET LUT Architecture for Enhanced Hardware Security

  • Research Article
  • 10.1109/tcsi.2024.3457541
On the Efficacy and Vulnerabilities of Logic Locking in Tree-Based Machine Learning
  • Jan 1, 2025
  • IEEE Transactions on Circuits and Systems I: Regular Papers
  • Brunno Alves De Abreu + 6 more

On the Efficacy and Vulnerabilities of Logic Locking in Tree-Based Machine Learning

  • Research Article
  • 10.1109/tcad.2025.3623550
DSMLock: Low Overhead Logic Locking for System Security with Design Space Modeling
  • Jan 1, 2025
  • IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
  • Robi Paul + 3 more

DSMLock: Low Overhead Logic Locking for System Security with Design Space Modeling

  • Research Article
  • 10.1109/access.2025.3612444
OptiLock: Automated Optimization of Learning-Resilient Logic Locking
  • Jan 1, 2025
  • IEEE Access
  • Zeng Wang + 5 more

OptiLock: Automated Optimization of Learning-Resilient Logic Locking

  • Research Article
  • Cite Count Icon 14
  • 10.1145/3677118
An Overview of FPGA-inspired Obfuscation Techniques
  • Oct 3, 2024
  • ACM Computing Surveys
  • Zain Ul Abideen + 3 more

Building and maintaining a silicon foundry is a costly endeavor that requires substantial financial investment. From this scenario, the semiconductor business has largely shifted to a fabless model where the Integrated Circuit (IC) supply chain is globalized but potentially untrusted. In recent years, several hardware obfuscation techniques have emerged to thwart hardware security threats related to untrusted IC fabrication. Reconfigurable-based obfuscation schemes have shown great promise of security against state-of-the-art attacks—these are techniques that rely on the transformation of static logic configurable elements such as Look Up Tables (LUTs). This survey provides a comprehensive analysis of reconfigurable-based obfuscation techniques, evaluating their overheads and enumerating their effectiveness against all known attacks. The techniques are also classified based on different factors, including the technology used, element type, and IP type. Additionally, we present a discussion on the advantages of reconfigurable-based obfuscation techniques when compared to Logic Locking techniques and the challenges associated with evaluating these techniques on hardware, primarily due to the lack of tapeouts. The survey’s findings are essential for researchers interested in hardware obfuscation and future trends in this area.

  • Research Article
  • 10.1587/elex.21.20240218
FCLock: harnessing functional non-combinational cycles in logic locking
  • Jun 25, 2024
  • IEICE Electronics Express
  • Xiang Chen + 2 more

FCLock: harnessing functional non-combinational cycles in logic locking

  • Research Article
  • Cite Count Icon 1
  • 10.1109/mdat.2024.3354569
Learning Your Lock: Exploiting Structural Vulnerabilities in Logic Locking
  • Apr 1, 2024
  • IEEE Design & Test
  • Prabuddha Chakraborty + 4 more

The decentralized semiconductor supply chain is vulnerable to different security threats such as intellectual property (IP) theft and malicious modifications. Logic locking (LL) can be used to secure digital designs from some of these threats and is typically carried out by inserting a set of logic gates/flops in the design such that the design can only be operated with the right key or key sequence. However, many LL techniques have been shown to be vulnerable to learning guided structural attacks such as SAIL. The goal of this work is to demonstrate the versatility, extensibility, and wide applicability of SAIL towards reinforcing the need for structural security in LL.

  • Open Access Icon
  • Research Article
  • Cite Count Icon 1
  • 10.1587/transfun.2023vlp0018
CRLock: A SAT and FALL Attacks Resistant Logic Locking Method for Controller at Register Transfer Level
  • Mar 1, 2024
  • IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
  • Masayoshi Yoshimura + 2 more

CRLock: A SAT and FALL Attacks Resistant Logic Locking Method for Controller at Register Transfer Level

  • Open Access Icon
  • Research Article
  • Cite Count Icon 1
  • 10.1587/elex.20.20230555
SFLL-AD: a self-adaptive and secure logic locking
  • Feb 10, 2024
  • IEICE Electronics Express
  • Ning Zhang + 2 more

Logic locking is an efficient defense against attacks to the intellectual property of integrated circuits. However, in recent years, boolean satisfaction based attack (SAT attack) and a structural based attack named Valkyrie were proposed. As far as we know, most of the locking methods failed to achieve security for both of them and keep an acceptable overhead. In this paper, we present a self-adaptive striped-function logic locking method named SFLL-AD, based on repeatedly modifying the structure of the encryption block to a form that: (1) permits splitting and dispersing the encryption block across the netlist to have resilience to Valkryie (2) and guarantees not losing SAT resilience. Experimental results of our mehtod confirm the security to both attacks and show a small overhead (about 10% on average).

  • Research Article
  • Cite Count Icon 4
  • 10.1007/s41635-024-00144-8
Machine Learning-Based Security Evaluation and Overhead Analysis of Logic Locking
  • Jan 22, 2024
  • Journal of Hardware and Systems Security
  • Yeganeh Aghamohammadi + 1 more

Machine Learning-Based Security Evaluation and Overhead Analysis of Logic Locking

  • Research Article
  • Cite Count Icon 3
  • 10.1109/tifs.2024.3431991
Thwarting GNN-Based Attacks Against Logic Locking
  • Jan 1, 2024
  • IEEE Transactions on Information Forensics and Security
  • Armin Darjani + 3 more

Thwarting GNN-Based Attacks Against Logic Locking

  • Research Article
  • Cite Count Icon 5
  • 10.1109/tcad.2023.3253428
On the Security of Sequential Logic Locking Against Oracle-Guided Attacks
  • Nov 1, 2023
  • IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
  • Yinghua Hu + 5 more

The Boolean satisfiability (SAT) attack is an oracle-guided attack that can break most combinational logic locking schemes by efficiently pruning out all the wrong keys from the search space. Extending such an attack to sequential logic locking requires multiple time-consuming rounds of SAT solving, performed using an "unrolled" version of the sequential circuit, and model checking, used to determine the successful termination of the attack. This article addresses these challenges by formally characterizing the relation between the minimum unrolling depth required to prune out the wrong keys of an SAT-based attack and a notion of functional corruptibility (FC) for sequential circuits, which can be efficiently estimated from a locked circuit to indicate the progress of an SAT-based attack. Based on this analysis, we present an FC-guided SAT-based attack that can significantly reduce unnecessary SAT and model-checking tasks. We present two versions of the attack, namely, <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Fun-SAT</monospace> and <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Fun-SAT+</monospace> , based on whether the attacker has a priori knowledge of the key length. <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Fun-SAT</monospace> aims to find the correct key sequence, while <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Fun-SAT+</monospace> aims to retrieve the correct initial state of the circuit. The numerical evaluation shows that <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Fun-SAT</monospace> can be, on average, <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$90\boldsymbol {\times }$ </tex-math></inline-formula> faster than previous attacks against state-of-the-art locking methods. On the other hand, when using an approximate termination condition, <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Fun-SAT+</monospace> can find an initial state that leads to at most 0.1% FC in 76.9% instances that would otherwise time out after one day.

  • Open Access Icon
  • Research Article
  • Cite Count Icon 16
  • 10.1109/tcad.2023.3240933
Complexity Analysis of the SAT Attack on Logic Locking
  • Oct 1, 2023
  • IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
  • Yadi Zhong + 1 more

Due to the adoption of horizontal business models following the globalization of semiconductor manufacturing, the overproduction of integrated circuits (ICs) and the piracy of intellectual properties (IPs) can lead to significant damage to the integrity of the semiconductor supply chain. Logic locking emerges as a primary design-for-security measure to counter these threats, where ICs become fully functional only when unlocked with a secret key. However, Boolean satisfiability (SAT)-based attacks have rendered most locking schemes ineffective. This gives rise to numerous defenses and new locking methods to achieve SAT resiliency. This article provides a unique perspective on the SAT attack efficiency based on conjunctive normal form (CNF) stored in SAT solver. First, we show how the attack learns new relations between keys in every iteration using distinguishing input patterns and the corresponding oracle responses. The input-output pairs result in new CNF clauses of unknown keys to be appended to the SAT solver, which leads to an exponential reduction in incorrect key values. Second, we demonstrate that the SAT attack can break any locking scheme within linear iteration complexity of key size. Moreover, we show how key constraints on point functions affect the SAT attack complexity. We explain why proper key constraint on AntiSAT reduces the complexity effectively to constant 1. The same constraint helps the breaking of CAS-Lock down to linear iteration complexity. Our analysis provides a new perspective on the capabilities of SAT attack against multiplier benchmark c6288, and we provide new directions to achieve SAT resiliency.

  • Open Access Icon
  • PDF Download Icon
  • Research Article
  • Cite Count Icon 5
  • 10.3390/j6030027
Quantum Logic Locking for Security
  • Jul 12, 2023
  • J
  • Rasit Onur Topaloglu

Having access to a unique quantum circuit that one wants to protect against use by others is a very likely scenario in industrial computing. However, currently, users rely on classical computer security schemes, which have known shortcomings. In this paper, we introduce a novel protection scheme along with a survey of other known methods to protect quantum information. In particular, we review physically unclonable functions (PUFs), obfuscation, and introduce quantum logic locking (QLL). The latter technique provisions end users to protect their circuit from an adversary through the use of a secret key.

  • 1
  • 2
  • 3
  • 1
  • 2
  • 3

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2026 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers