Sparse prime implement attack: https://github.tamu.edu/hardwaresecurity/SPI_attack
Logic locking (based on our CCS ’17 paper): https://github.com/DfX-NYUAD/CCS17/blob/master/README.md
Split manufacturing (based on our DAC ’16 paper): https://github.com/seth-tamu/network_flow_attack
New vulnerabilities detected by our first hardware fuzzer, TheHuzz (USENIX Security ’22 paper): https://seth.engr.tamu.edu/software-releases/thehuzz CVEs: CVE-2021-40506, CVE-2021-40507, CVE-2021-41612, CVE-2021-41614, and CVE-2021-41613.
New vulnerabilities detected by our second hardware fuzzer, HyPFuzz (USENIX Security ’23 paper): https://seth.engr.tamu.edu/software-releases/hypfuzz/ CVEs: CVE-2022-33021 and CVE-2022-33023.
If you are interested in hardware-hacking competitions and/or “buggy” System-on-Chip designs, check out Hack@DAC (co-located with DAC): https://hack-dac19.trust-sysec.com/
We highly appreciate your comments and feedback on our releases. Our students will also answer your questions if you have any.