The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes.
M. Tanjidur RahmanShahin TajikM. Sazadur RahmanMark M. TehranipoorNavid AsadizanjaniPublished in: HOST (2020)
Keyphrases
- high security
- protection schemes
- intrusion detection
- access control
- network security
- security issues
- computer security
- concurrency control
- security requirements
- secure communication
- key agreement
- statistical databases
- security mechanisms
- security systems
- cryptographic protocols
- security properties
- distributed databases