{"id":3663,"date":"2022-12-17T21:27:41","date_gmt":"2022-12-17T21:27:41","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3663"},"modified":"2022-12-18T18:13:16","modified_gmt":"2022-12-18T18:13:16","slug":"sweep","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/ip-protection\/sweep\/","title":{"rendered":"SWEEP"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Tool Name<\/h2>\n\n\n\n<p>SWEEP<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Description<\/strong><\/h2>\n\n\n\n<p>The SWEEP attack targets MUX-based logic locking techniques. SWEEP does not require the unlocked design (oracle-less), but it needs some training data for benchmarks that are obfuscated using the same locking algorithm.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>More Info<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"https:\/\/github.com\/alaql89\/SWEEP\/\" target=\"_blank\" rel=\"noreferrer noopener\">tool link<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Publications\/References<\/strong><\/h2>\n\n\n\n<p>A. Alaql, D. Forte and S. Bhunia, &#8220;Sweep to the Secret: A Constant Propagation Attack on Logic Locking,&#8221;\u00a0<em>2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)<\/em>, 2019, pp. 1-6, doi: 10.1109\/AsianHOST47458.2019.9006720. <a href=\"https:\/\/ieeexplore.ieee.org\/document\/9006720\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ieeexplore.ieee.org\/document\/9006720<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contacts<\/strong><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Tool Name SWEEP Description The SWEEP attack targets MUX-based logic locking techniques. SWEEP does not require the unlocked design (oracle-less), but it needs some training data for benchmarks that are obfuscated using the same locking algorithm. More Info Publications\/References A. Alaql, D. Forte and S. Bhunia, &#8220;Sweep to the Secret: A Constant Propagation Attack on &hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":2347,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3663"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3663"}],"version-history":[{"count":3,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3663\/revisions"}],"predecessor-version":[{"id":3746,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3663\/revisions\/3746"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2347"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}