{"id":3654,"date":"2022-12-17T21:23:14","date_gmt":"2022-12-17T21:23:14","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3654"},"modified":"2022-12-18T18:10:44","modified_gmt":"2022-12-18T18:10:44","slug":"smt-attack","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/ip-protection\/smt-attack\/","title":{"rendered":"SMT Attack"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Tool Name<\/h2>\n\n\n\n<p>SMT Attack<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Description<\/strong><\/h2>\n\n\n\n<p>SMT tool is a SAT Module Theory solver based attack on logic locking. SMT attack provides Boolean SAT solver as well as non-Boolean theory solvers, such as graph theory solver.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>More Info<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"https:\/\/github.com\/gate-lab\/SMTAttack\" target=\"_blank\" rel=\"noreferrer noopener\">tool link<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Publications\/References<\/strong><\/h2>\n\n\n\n<p>Azar, K. Z., Kamali, H. M., Homayoun, H., &amp; Sasan, A. (2018). SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks.\u00a0<em>IACR Transactions on Cryptographic Hardware and Embedded Systems<\/em>,\u00a0<em>2019<\/em>(1), 97\u2013122. <a href=\"https:\/\/doi.org\/10.13154\/tches.v2019.i1.97-122\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/doi.org\/10.13154\/tches.v2019.i1.97-122<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contacts<\/strong><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Tool Name SMT Attack Description SMT tool is a SAT Module Theory solver based attack on logic locking. SMT attack provides Boolean SAT solver as well as non-Boolean theory solvers, such as graph theory solver.\u00a0 More Info Publications\/References Azar, K. Z., Kamali, H. M., Homayoun, H., &amp; Sasan, A. (2018). SMT Attack: Next Generation Attack &hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":2347,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3654"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3654"}],"version-history":[{"count":3,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3654\/revisions"}],"predecessor-version":[{"id":3744,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3654\/revisions\/3744"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2347"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}