Follow
Yuanqi Shen
Yuanqi Shen
Verified email at u.northwestern.edu - Homepage
Title
Cited by
Cited by
Year
Double DIP: Re-evaluating security of logic encryption algorithms
Y Shen, H Zhou
Proceedings of the on Great Lakes Symposium on VLSI 2017, 179-184, 2017
2262017
Cyclic locking and memristor-based obfuscation against CycSAT and inside foundry attacks
A Rezaei, Y Shen, S Kong, J Gu, H Zhou
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 85-90, 2018
602018
BeSAT: Behavioral SAT-based attack on cyclic logic encryption
Y Shen, Y Li, A Rezaei, S Kong, D Dlott, H Zhou
Proceedings of the 24th Asia and South Pacific Design Automation Conference …, 2019
542019
SAT-based bit-flipping attack on logic encryptions
Y Shen, A Rezaei, H Zhou
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 629-632, 2018
442018
Resolving the trilemma in logic encryption
H Zhou, A Rezaei, Y Shen
2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2019
352019
CycSAT-unresolvable cyclic logic encryption using unreachable states
A Rezaei, Y Li, Y Shen, S Kong, H Zhou
Proceedings of the 24th Asia and South Pacific Design Automation Conference …, 2019
352019
Benchmarking at the frontier of hardware security: Lessons from logic locking
B Tan, R Karri, N Limaye, A Sengupta, O Sinanoglu, MM Rahman, ...
arXiv preprint arXiv:2006.06806, 2020
342020
A comparative investigation of approximate attacks on logic encryptions
Y Shen, A Rezaei, H Zhou
2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC), 271-276, 2018
282018
Rescuing logic encryption in post-SAT era by locking & obfuscation
A Rezaei, Y Shen, H Zhou
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 13-18, 2020
262020
SigAttack: New high-level SAT-based attack on logic encryptions
Y Shen, Y Li, S Kong, A Rezaei, H Zhou
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 940-943, 2019
222019
Vulnerability and remedy of stripped function logic locking
H Zhou, Y Shen, A Rezaei
Cryptology ePrint Archive, 2019
142019
Leveraging microarchitectural side channel information to efficiently enhance program control flow integrity
C Liu, C Yang, Y Shen
Proceedings of the 2014 International Conference on Hardware/Software …, 2014
112014
Double DIP
Y Shen, H Zhou
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017
42017
Using security invariant to verify confidentiality in hardware design
S Kong, Y Shen, H Zhou
Proceedings of the on Great Lakes Symposium on VLSI 2017, 487-490, 2017
42017
Security Analysis of Combinational Logic Encryption Algorithms
Y Shen
Northwestern University, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–15