-
Defense-in-Depth: A Recipe for Logic Locking to Prevail
Authors:
M Tanjidur Rahman,
M Sazadur Rahman,
Huanyu Wang,
Shahin Tajik,
Waleed Khalil,
Farimah Farahmandi,
Domenic Forte,
Navid Asadizanjani,
Mark Tehranipoor
Abstract:
Logic locking has emerged as a promising solution for protecting the semiconductor intellectual Property (IP) from the untrusted entities in the design and fabrication process. Logic locking hides the functionality of the IP by embedding additional key-gates in the circuit. The correct output of the chip is produced, once the correct key value is available at the input of the key-gates. The confid…
▽ More
Logic locking has emerged as a promising solution for protecting the semiconductor intellectual Property (IP) from the untrusted entities in the design and fabrication process. Logic locking hides the functionality of the IP by embedding additional key-gates in the circuit. The correct output of the chip is produced, once the correct key value is available at the input of the key-gates. The confidentiality of the key is imperative for the security of the locked IP as it stands as the lone barrier against IP infringement. Therefore, the logic locking is considered as a broken scheme once the key value is exposed. The research community has shown the vulnerability of the logic locking techniques against different classes of attacks, such as Oracle-guided and physical attacks. Although several countermeasures have already been proposed against such attacks, none of them is simultaneously impeccable against Oracle-guided, Oracle-less, and physical attacks. Under such circumstances, a defense-in-depth approach can be considered as a practical approach in addressing the vulnerabilities of logic locking. Defense-in-depth is a multilayer defense approach where several independent countermeasures are implemented in the device to provide aggregated protection against different attack vectors. Introducing such a multilayer defense model in logic locking is the major contribution of this paper. With regard to this, we first identify the core components of logic locking schemes, which need to be protected. Afterwards, we categorize the vulnerabilities of core components according to potential threats for the locking key in logic locking schemes. Furthermore, we propose several defense layers and countermeasures to protect the device from those vulnerabilities. Finally, we turn our focus to open research questions and conclude with suggestions for future research directions.
△ Less
Submitted 20 July, 2019;
originally announced July 2019.
-
A Design Blueprint for Virtual Organizations in a Service Oriented Landscape
Authors:
Wajeeha Khalil,
Erich Schikuta
Abstract:
"United we stand, divided we fall" is a well known saying. We are living in the era of virtual collaborations. Advancement on conceptual and technological level has enhanced the way people communicate. Everything-as-a-Service once a dream, now becoming a reality.
Problem nature has also been changed over the time. Today, e-Collaborations are applied to all the domains possible. Extensive data an…
▽ More
"United we stand, divided we fall" is a well known saying. We are living in the era of virtual collaborations. Advancement on conceptual and technological level has enhanced the way people communicate. Everything-as-a-Service once a dream, now becoming a reality.
Problem nature has also been changed over the time. Today, e-Collaborations are applied to all the domains possible. Extensive data and computing resources are in need and assistance from human experts is also becoming essential. This puts a great responsibility on Information Technology (IT) researchers and developers to provide generic platforms where user can easily communicate and solve their problems. To realize this concept, distributed computing has offered many paradigms, e.g. cluster, grid, cloud computing. Virtual Organization (VO) is a logical orchestration of globally dispersed resources to achieve common goals.
Existing paradigms and technology are used to form Virtual Organization, but lack of standards remained a critical issue for last two decades. Our research endeavor focuses on developing a design blueprint for Virtual Organization building process. The proposed standardization process is a two phase activity. First phase provides requirement analysis and the second phase presents a Reference Architecture for Virtual Organization (RAVO). This form of standardization is chosen to accommodate both technological and paradigm shift. We categorize our efforts in two parts. First part consists of a pattern to identify the requirements and components of a Virtual Organization. Second part details a generic framework based on the concept of Everything-as-a-Service.
△ Less
Submitted 14 December, 2013;
originally announced December 2013.
-
Modélisation Dynamique d'un Robot Parallèle à 3-DDL : l'Orthoglide
Authors:
Sylvain Guegan,
Wisama Khalil,
Damien Chablat,
Philippe Wenger
Abstract:
In this article, we propose a method for calculation of the inverse and direct dynamic models of the Orthoglide, a parallel robot with threedegrees of freedom in translation. These models are calculated starting from the elements of the dynamic model of the kinematic chain structure and equations of Newton-Euler applied to the platform. These models are obtained in explicit form having an intere…
▽ More
In this article, we propose a method for calculation of the inverse and direct dynamic models of the Orthoglide, a parallel robot with threedegrees of freedom in translation. These models are calculated starting from the elements of the dynamic model of the kinematic chain structure and equations of Newton-Euler applied to the platform. These models are obtained in explicit form having an interesting physical interpretation.
△ Less
Submitted 15 July, 2007;
originally announced July 2007.