scispace - formally typeset
B

Bicky Shakya

Researcher at University of Florida

Publications -  23
Citations -  698

Bicky Shakya is an academic researcher from University of Florida. The author has contributed to research in topics: Hardware obfuscation & Supply chain. The author has an hindex of 10, co-authored 23 publications receiving 452 citations. Previous affiliations of Bicky Shakya include Trinity College, Dublin.

Papers
More filters
Journal ArticleDOI

Benchmarking of Hardware Trojans and Maliciously Affected Circuits

TL;DR: This paper presents a comprehensive vulnerability analysis flow at various levels of abstraction of digital-design, that has been utilized to create a suite of Trojans and ‘trust benchmarks’ that can be used by researchers in the community to compare and contrast various Trojan detection techniques.
Book ChapterDOI

Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks

TL;DR: A novel “bypass attack” is proposed that ensures the locked circuit works even when an incorrect key is applied and makes it possible for an adversary to be oblivious to the type of SAT-resistant protection applied on the circuit, and still be able to restore the circuit to its correct functionality.
Journal ArticleDOI

Electronics Supply Chain Integrity Enabled by Blockchain

TL;DR: A blockchain-based certificate authority framework that can be used to manage critical chip information such as electronic chip identification, chip grade, and transaction time is proposed that can mitigate most threats of the electronics supply chain, such as recycling, remarking, cloning, and overproduction.
Journal ArticleDOI

Development and Evaluation of Hardware Obfuscation Benchmarks

TL;DR: A set of well-defined benchmarks obfuscated with some popular methods that are made publicly available and provide the first evaluation of several obfuscation approaches based on the metrics and existing attacks using this new suite.
Proceedings ArticleDOI

CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme

TL;DR: A new lightweight locking technique: CAS-Lock (cascaded locking) which nullifies both SAT and bypass attacks, while simultaneously maintaining nontrivial output corruptibility, in stark contrast to the well-accepted notion that there is an inherent trade-off between output corruptible and SAT resistance.