{"id":3666,"date":"2022-12-17T21:30:35","date_gmt":"2022-12-17T21:30:35","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3666"},"modified":"2022-12-18T17:53:23","modified_gmt":"2022-12-18T17:53:23","slug":"omla","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/ip-protection\/omla\/","title":{"rendered":"OMLA"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Tool Name<\/h2>\n\n\n\n<p>OMLA: An Oracle-Less Machine Learning-Based Attack on Logic Locking<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Description<\/strong><\/h2>\n\n\n\n<p>OMLA is an oracle-less attack on traditional logic locking which maps the problem of resolving the key-bit value to subgraph classification. OMLA extracts a small subgraph for each key-gate from the locked netlist. The enclosing subgraphs capture the characteristics associated with the key-bit values of the key-gates. Therefore, the label of a subgraph can also be considered the key-bit value.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>More Info<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"https:\/\/github.com\/DfX-NYUAD\/OMLA\" target=\"_blank\" rel=\"noreferrer noopener\">Tool link<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Publications\/References<\/strong><\/h2>\n\n\n\n<p>L. Alrahis, S. Patnaik, M. Shafique and O. Sinanoglu, &#8220;OMLA: An Oracle-Less Machine Learning-Based Attack on Logic Locking,&#8221; in\u00a0<em>IEEE Transactions on Circuits and Systems II: Express Briefs<\/em>, vol. 69, no. 3, pp. 1602-1606, March 2022, doi: 10.1109\/TCSII.2021.3113035. <a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9539868\" target=\"_blank\"> https:\/\/ieeexplore.ieee.org\/abstract\/document\/9539868<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contacts<\/strong><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Tool Name OMLA: An Oracle-Less Machine Learning-Based Attack on Logic Locking Description OMLA is an oracle-less attack on traditional logic locking which maps the problem of resolving the key-bit value to subgraph classification. OMLA extracts a small subgraph for each key-gate from the locked netlist. The enclosing subgraphs capture the characteristics associated with the key-bit &hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":2347,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3666"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3666"}],"version-history":[{"count":3,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3666\/revisions"}],"predecessor-version":[{"id":3736,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3666\/revisions\/3736"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2347"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}