%PDF-1.4
%
1 0 obj
<>
endobj
2 0 obj
<>
endobj
3 0 obj
<>stream
IEEE
2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST);2020; ; ;10.1109/HOST45689.2020.9300258
Logic Locking
Optical Probing
Tamper-proof Memory
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes
endstream
endobj
4 0 obj
<>stream
x+ |
endstream
endobj
5 0 obj
<>stream
x0D+fA;[EkJm[ld m9Mo!i!NU$h+*(Y
tNH؛W-:{7LQh:Ճœx3>`5|ښ,pk]DY8oeE۪>?)t~L8;9
endstream
endobj
6 0 obj
<>stream
x+ |
endstream
endobj
7 0 obj
<>stream
x0D+fALtmEkJm[ldL/2)XM3wctm:0V~E%K]ΉP{-qPxhex,qT8$$<[Qjk<ǭ
wἕF;U}1{RJgO(;=
endstream
endobj
8 0 obj
<>stream
x+ |
endstream
endobj
9 0 obj
<>stream
x0D+fALt-5Ŷh-f6g2gPЋ7FP1N" Iƭɦwmėאz-γJ
u`?JV8r@0P:rR\-y;3Έ ,ʮC){RB O;>
endstream
endobj
10 0 obj
<>stream
x+ |
endstream
endobj
11 0 obj
<>stream
x0D+fALtmEkJm[ldLO22E
^EkiX5vz'BiMB˗NA歕uƩWd̒lFvhiqe".y++/v]cѕP;?
endstream
endobj
12 0 obj
<>stream
x+ |
endstream
endobj
13 0 obj
<>stream
x0D+fA*Lt-5Ŷhf6g2gPғ6W k)/F"d M[Gڈo E͕0XK'gs\xqc[*NU-p(arE/3\EQ;Έ ,c){PL%}M;;
endstream
endobj
14 0 obj
<>stream
x+ |
endstream
endobj
15 0 obj
<>stream
x0D+fA&Sk¶5Ŷhf6g2gp'KD
V-4m
V+?W]ΉP{KX'}Sc_[*XFЩq2J&Ii>pa4E
w'ἕW/vmCљR;A
endstream
endobj
16 0 obj
<>stream
x+ |
endstream
endobj
17 0 obj
<>stream
x0D+fALtmEkJm[ldHOZ3^e%H/,m-V+?.@D()p%~iSyykex,qՀ$q|V,r\5-eYڅpKxש!=dt#}K|;8
endstream
endobj
18 0 obj
<>stream
x+ |
endstream
endobj
19 0 obj
<>stream
x0D+fALtmEkJm[ldHOZ3^e%H/,m-V+?.@D()p%~iSyykex,qՀ$q|V,r\5-eYڅpKxש!=dt#}Q\;@
endstream
endobj
20 0 obj
<>stream
x+ |
endstream
endobj
21 0 obj
<>stream
x0D+fALtmEkJm[ldLO22A
^EiZmz7V~D
%+]މPZ{%~ipPyykex,qՀ8$$<[QkZ>stream
x+ |
endstream
endobj
23 0 obj
<>stream
x0D+fA;["EkJm[ldΠm8MHk1މat;0V~E%oB 4&E˷N^*#G+SV2N`$l
oQ[9m8 筼yiCٶ0O9r0;i
endstream
endobj
24 0 obj
<>stream
x+ |
endstream
endobj
25 0 obj
<>stream
x0D+fALtmEkJm[ldL/2)XM3wctm:0V~E%K]ΉP{-qPxhex,qT8$$<[Qjk<ǭ
wἕF;U}1{RJgNl;<
endstream
endobj
26 0 obj
<>
endobj
27 0 obj
<>stream
hބRklSe>gPXs91L(#*tQ2AưA۱vt]s齧uڳݍ #0,F1`ÐLK|7>/ȁ`-*yx3E
TfP8nvs2ŏ=]Ay.84<~ì;tfkuqMQUgY-L9[i:S~@4I1?(j&"07Ih $'Dg3i ZD<'1Q}@[ƍOxƹKx`,x5
$V<tĠ)GZ)~˳sM\^;>'!vtzwy,H250jsc@nG'S#B[Ni.-+'Z K.&ԢcNaV
Hvn[͢t
Nc
mx٩]6G
fw6x/ڱx1?L2x?79ԵcȲK0?H=Bgu ?c@[4H`܇'يQfL %3}=#}.F.vn:{DGHK1{Τ>rQ"LTDpZʝ}.4ufED s#~+tb4VEB>2=.-(b ae;r~h)9' .eH+5{m3@pYxCJctԤDz&CWm2XpCMK wąa=fU&pI)
@ŭUX WnX͜% 1
endstream
endobj
28 0 obj
<<>>
endobj
29 0 obj
<>stream
Adobe d
$$''$$53335;;;;;;;;;;
%% ## ((%%((22022;;;;;;;;;; [" " ?
3 !1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw 5 !1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ? Iy$I$I)I$I#cc>iG.V-v> [C:?l#e!)d59|GC43R/Ìk3$]eJ#*Ѣ] )Ycv*+(2HbD W\l!R0}D$Gse_iBw82S$I(ԒI$I$$I$I)I$I$JRI$p~;sW7Qִnk1Cu>#zay^ ż<=K/ñG