Meng Li's Homepage
Meng Li's Homepage
Home
News
Talks
Publications
Projects
Students
Contact
Light
Dark
Automatic
English
中文 (简体)
Hardware Security
TimingSAT: Decamouflaging timing-based logic obfuscation
In order to counter advanced reverse engineering techniques, various integrated circuit (IC) camouflaging methods are proposed to …
Meng Li
,
Kaveh Shamsi
,
Yier Jin
,
David Z Pan
A Synergistic Framework for Hardware IP Privacy and Integrity Protection
Publised by Springer, UT Austin Margarida Jacome Outstanding Dis- sertation Prize, EDAA Outstanding Dissertation Award, ACM Student Research Competition Grand Final First Place
Meng Li
,
David Z. Pan
A Practical Split Manufacturing Framework for Trojan Prevention via Simultaneous Wire Lifting and Cell Insertion
The advancing of reverse engineering techniques has complicated the efforts in intellectual property protection. Proactive methods have …
Meng Li
,
Bei Yu
,
Yibo Lin
,
Xiaoqing Xu
,
Wuxi Li
,
David Z. Pan
A Practical Split Manufacturing Framework for Trojan Prevention via Simultaneous Wire Lifting and Cell Insertion
Neural network accelerator is a key enabler for the on-device AI inference, for which energy efficiency is an important metric. The …
Meng Li
,
Bei Yu
,
Yibo Lin
,
Xiaoqing Xu
,
Wuxi Li
,
David Z. Pan
Provably secure camouflaging strategy for IC protection
The advancing of reverse engineering techniques has complicated the efforts in intellectual property protection. Proactive methods have …
Meng Li
,
Kaveh Shamsi
,
Travis Meade
,
Zheng Zhao
,
Bei Yu
,
Yier Jin
,
David Z Pan
Provably secure camouflaging strategy for IC protection
The advancing of reverse engineering techniques has complicated the efforts in intellectual property protection. Proactive methods have …
Meng Li
,
Kaveh Shamsi
,
Travis Meade
,
Zheng Zhao
,
Bei Yu
,
Yier Jin
,
David Z Pan
Cross-level monte carlo framework for system vulnerability evaluation against fault attack
Fault attack becomes a serious threat to system security and requires to be evaluated in the design stage. Existing methods usually …
Meng Li
,
Liangzhen Lai
,
Vikas Chandra
,
David Z. Pan
AppSAT: Approximately Deobfuscating Integrated Circuits
In today’s diversified semiconductor supply-chain, protecting intellectual property (IP) and maintaining manufacturing integrity …
Kaveh Shamsi
,
Meng Li
,
Travis Meade
,
Zheng Zhao
,
David Z Pan
,
Yier Jin
A monte carlo simulation flow for seu analysis of sequential circuits
An efficient methodology for soft error analysis of sequential circuits based on Monte Carlo sampling is proposed. It uses nested …
Meng Li
,
Ye Wang
,
Michael Orshansky
Practical public PUF enabled by solving max-flow problem on chip
The execution-simulation gap (ESG) is a fundamental property of public physical unclonable function (PPUF), which exploits the time gap …
Meng Li
,
Jin Miao
,
Kai Zhong
,
David Z Pan
Cite
×