Skip to main content

Showing 1–14 of 14 results for author: Guin, U

.
  1. arXiv:2505.17310  [pdf, ps, other

    cs.CR cs.ET

    Advancing Security with Digital Twins: A Comprehensive Survey

    Authors: Blessing Airehenbuwa, Touseef Hasan, Souvika Sarkar, Ujjwal Guin

    Abstract: The proliferation of electronic devices has greatly transformed every aspect of human life, such as communication, healthcare, transportation, and energy. Unfortunately, the global electronics supply chain is vulnerable to various attacks, including piracy of intellectual properties, tampering, counterfeiting, information leakage, side-channel, and fault injection attacks, due to the complex natur… ▽ More

    Submitted 22 May, 2025; originally announced May 2025.

  2. arXiv:2505.17253  [pdf, ps, other

    cs.CR cs.ET

    Understanding the Security Landscape of Embedded Non-Volatile Memories: A Comprehensive Survey

    Authors: Zakia Tamanna Tisha, Ujjwal Guin

    Abstract: The modern semiconductor industry requires memory solutions that can keep pace with the high-speed demands of high-performance computing. Embedded non-volatile memories (eNVMs) address these requirements by offering faster access to stored data at an improved computational throughput and efficiency. Furthermore, these technologies offer numerous appealing features, including limited area-energy-ru… ▽ More

    Submitted 22 May, 2025; originally announced May 2025.

  3. arXiv:2412.08777  [pdf, other

    cs.CR

    Reward-based Blockchain Infrastructure for 3D IC Supply Chain Provenance

    Authors: Sulyab Thottungal Valapu, Aritri Saha, Bhaskar Krishnamachari, Vivek Menon, Ujjwal Guin

    Abstract: In response to the growing demand for enhanced performance and power efficiency, the semiconductor industry has witnessed a paradigm shift toward heterogeneous integration, giving rise to 2.5D/3D chips. These chips incorporate diverse chiplets, manufactured globally and integrated into a single chip. Securing these complex 2.5D/3D integrated circuits (ICs) presents a formidable challenge due to in… ▽ More

    Submitted 11 December, 2024; originally announced December 2024.

  4. arXiv:2208.02883  [pdf, other

    cs.CR cs.IR

    Beware of Discarding Used SRAMs: Information is Stored Permanently

    Authors: Joshua Hovanes, Yadi Zhong, Ujjwal Guin

    Abstract: Data recovery has long been a focus of the electronics industry for decades by security experts, focusing on hard disk recovery, a type of non-volatile memory. Unfortunately, none of the existing research, neither from academia, industry, or government, have ever considered data recovery from volatile memories. The data is lost when it is powered off, by definition. To the best of our knowledge, w… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

  5. arXiv:2207.01808  [pdf, other

    cs.CR

    Complexity Analysis of the SAT Attack on Logic Locking

    Authors: Yadi Zhong, Ujjwal Guin

    Abstract: Due to the adoption of horizontal business models following the globalization of semiconductor manufacturing, the overproduction of integrated circuits (ICs) and the piracy of intellectual properties (IPs) can lead to significant damage to the integrity of the semiconductor supply chain. Logic locking emerges as a primary design-for-security measure to counter these threats, where ICs become fully… ▽ More

    Submitted 14 December, 2022; v1 submitted 5 July, 2022; originally announced July 2022.

  6. arXiv:2206.04754  [pdf, other

    cs.CR

    AFIA: ATPG-Guided Fault Injection Attack on Secure Logic Locking

    Authors: Yadi Zhong, Ayush Jain, M. Tanjidur Rahman, Navid Asadizanjani, Jiafeng Xie, Ujjwal Guin

    Abstract: The outsourcing of the design and manufacturing of integrated circuits has raised severe concerns about the piracy of Intellectual Properties and illegal overproduction. Logic locking has emerged as an obfuscation technique to protect outsourced chip designs, where the circuit netlist is locked and can only be functional once a secure key is programmed. However, Boolean Satisfiability-based attack… ▽ More

    Submitted 12 October, 2022; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: arXiv admin note: text overlap with arXiv:2007.10512

  7. arXiv:2204.11307  [pdf, other

    cs.CR

    A Comprehensive Test Pattern Generation Approach Exploiting SAT Attack for Logic Locking

    Authors: Yadi Zhong, Ujjwal Guin

    Abstract: The need for reducing manufacturing defect escape in today's safety-critical applications requires increased fault coverage. However, generating a test set using commercial automatic test pattern generation (ATPG) tools that lead to zero-defect escape is still an open problem. It is challenging to detect all stuck-at faults to reach 100% fault coverage. In parallel, the hardware security community… ▽ More

    Submitted 8 February, 2023; v1 submitted 24 April, 2022; originally announced April 2022.

    Comments: 12 pages, 7 figures, 5 tables

  8. arXiv:2103.12166  [pdf, other

    cs.AR

    Special Session: Reliability Analysis for ML/AI Hardware

    Authors: Shamik Kundu, Kanad Basu, Mehdi Sadi, Twisha Titirsha, Shihao Song, Anup Das, Ujjwal Guin

    Abstract: Artificial intelligence (AI) and Machine Learning (ML) are becoming pervasive in today's applications, such as autonomous vehicles, healthcare, aerospace, cybersecurity, and many critical applications. Ensuring the reliability and robustness of the underlying AI/ML hardware becomes our paramount importance. In this paper, we explore and evaluate the reliability of different AI/ML hardware. The fir… ▽ More

    Submitted 29 March, 2021; v1 submitted 22 March, 2021; originally announced March 2021.

    Comments: To appear at VLSI Test Symposium

  9. arXiv:2008.03290  [pdf, other

    cs.CR

    A Novel Tampering Attack on AES Cores with Hardware Trojans

    Authors: Ayush Jain, Ujjwal Guin

    Abstract: The implementation of cryptographic primitives in integrated circuits (ICs) continues to increase over the years due to the recent advancement of semiconductor manufacturing and reduction of cost per transistors. The hardware implementation makes cryptographic operations faster and more energy-efficient. However, various hardware attacks have been proposed aiming to extract the secret key in order… ▽ More

    Submitted 7 August, 2020; originally announced August 2020.

  10. arXiv:2007.10512  [pdf, other

    cs.CR

    ATPG-Guided Fault Injection Attacks on Logic Locking

    Authors: Ayush Jain, Tanjidur Rahman, Ujjwal Guin

    Abstract: Logic Locking is a well-accepted protection technique to enable trust in the outsourced design and fabrication processes of integrated circuits (ICs) where the original design is modified by incorporating additional key gates in the netlist, resulting in a key-dependent functional circuit. The original functionality of the chip is recovered once it is programmed with the secret key, otherwise, it… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

  11. arXiv:2006.06806  [pdf, other

    cs.CR

    Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking

    Authors: Benjamin Tan, Ramesh Karri, Nimisha Limaye, Abhrajit Sengupta, Ozgur Sinanoglu, Md Moshiur Rahman, Swarup Bhunia, Danielle Duvalsaint, R. D., Blanton, Amin Rezaei, Yuanqi Shen, Hai Zhou, Leon Li, Alex Orailoglu, Zhaokun Han, Austin Benedetti, Luciano Brignone, Muhammad Yasin, Jeyavijayan Rajendran, Michael Zuzak, Ankur Srivastava, Ujjwal Guin, Chandan Karfa, Kanad Basu , et al. (11 additional authors not shown)

    Abstract: Integrated circuits (ICs) are the foundation of all computing systems. They comprise high-value hardware intellectual property (IP) that are at risk of piracy, reverse-engineering, and modifications while making their way through the geographically-distributed IC supply chain. On the frontier of hardware security are various design-for-trust techniques that claim to protect designs from untrusted… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

  12. arXiv:2006.05930  [pdf, other

    cs.CR

    A Novel Topology-Guided Attack and Its Countermeasure Towards Secure Logic Locking

    Authors: Yuqiao Zhang, Ayush Jain, Pinchen Cui, Ziqi Zhou, Ujjwal Guin

    Abstract: The outsourcing of the design and manufacturing of integrated circuits (ICs) in the current horizontal semiconductor integration flow has posed various security threats due to the presence of untrusted entities, such as overproduction of ICs, sale of out-of-specification/rejected ICs, and piracy of Intellectual Properties (IPs). Consequently, logic locking emerged as one of the prominent design fo… ▽ More

    Submitted 8 October, 2020; v1 submitted 10 June, 2020; originally announced June 2020.

  13. arXiv:2006.04798  [pdf, other

    cs.DC eess.SP

    Yield Loss Reduction and Test of AI and Deep Learning Accelerators

    Authors: Mehdi Sadi, Ujjwal Guin

    Abstract: With data-driven analytics becoming mainstream, the global demand for dedicated AI and Deep Learning accelerator chips is soaring. These accelerators, designed with densely packed Processing Elements (PE), are especially vulnerable to the manufacturing defects and functional faults common in the advanced semiconductor process nodes resulting in significant yield loss. In this work, we demonstrate… ▽ More

    Submitted 22 October, 2020; v1 submitted 8 June, 2020; originally announced June 2020.

    Comments: Pre-print of IEEE Transactions on CAD Journal

  14. arXiv:1909.07426  [pdf, other

    cs.CR

    TAAL: Tampering Attack on Any Key-based Logic Locked Circuits

    Authors: Ayush Jain, Ziqi Zhou, Ujjwal Guin

    Abstract: Due to the globalization of semiconductor manufacturing and test processes, the system-on-a-chip (SoC) designers no longer design the complete SoC and manufacture chips on their own. This outsourcing of the design and manufacturing of Integrated Circuits (ICs) has resulted in several threats, such as overproduction of ICs, sale of out-of-specification/rejected ICs, and piracy of Intellectual Prope… ▽ More

    Submitted 11 December, 2020; v1 submitted 16 September, 2019; originally announced September 2019.