Sparse prime implement attack: https://github.tamu.edu/hardwaresecurity/SPI_attack
Logic locking (based on our CCS ’17 paper): https://github.com/DfX-NYUAD/CCS17/blob/master/README.md
Split manufacturing (based on our DAC ’16 paper): https://github.com/seth-tamu/network_flow_attack
New vulnerabilities detected by our hardware fuzzer, TheHuzz (USENIX Security ’22 paper): https://seth.engr.tamu.edu/software-releases/thehuzz
If you are interested in hardware-hacking competitions and/or “buggy” System-on-Chip designs, check out Hack@DAC (co-located with DAC): https://hack-dac19.trust-sysec.com/
We highly appreciate your comments and feedback on our releases. Our students will also answer your questions if you have any.