ACKNOWLEDGEMENTS
The authors would like to thank the anonymous
reviewers for their comments and suggestions that
helped improve the paper.
REFERENCES
Atallah, M. J. and Frikken, K. B. (2010). Securely outsourc-
ing linear algebra computations. In In Proceedings of
the 5th ACM Symposium on Information, Computer
and Communications Security, ASIACCS ’10, pages
48–59, New York, NY, USA, 2010. ACM.
Blanton, M., Steele, A., and Alisagari, M. (2013). Data-
oblivious graph algorithms for secure computation
and outsourcing. In Proceedings of the 8th ACM
SIGSAC symposium on Information, computer and
communications security, pages 207–218. ACM.
Brun, Y. and Medvidovic., N. (2012). Keeping data private
while computing in the cloud. In In Cloud Computing
(CLOUD), 2012 IEEE 5th International Conference
on, pp. 285-294. IEEE.
C. Wang, K. R. and Wang, J. (2011). Secure and practical
outsourcing of linear programming in cloud comput-
ing. In In INFOCOM 2011, pages 820–828. IEEE.
Chakraborty, R. S. and Bhunia., S. (2009). Harpoon: an
obfuscation-based soc design methodology for hard-
ware protection. In IEEE Transactions on Computer-
Aided Design of Integrated Circuits and Systems 28,
no. 10 (2009): 1493-1502.
Chen, Y.-C. (2018). Enhancements to sat attack: Speedup
and breaking cyclic logic encryption. In ACM Trans-
actions on Design Automation of Electronic Systems
(TODAES) 23, no. 4 (2018): 52.
Ding, Yong, Z. X. J. Y. and Choo., K.-K. R. (2017). Secure
outsourcing of modular exponentiations under single
untrusted programme model. In Journal of Computer
and System Sciences 90 (2017): 1-13.
Eriksson, J. and H
¨
oglund., J. (2014). A comparison of re-
ductions from fact to cnf-sat.
Garg, Sanjam, C. G. S. H. M. R. A. S. and Waters, B.
(2016). Candidate indistinguishability obfuscation
and functional encryption for all circuits. In In SIAM
Journal on Computing 45, no. 3 (2016): 882-929.
Gentry, C. (2009). Fully homomorphic encryption using
ideal lattices. In In Stoc, vol. 9, no. 2009, pp. 169-
178.
Hosseinzadeh, Shohreh, S. R. S. L. J.-M. M. J. H. S. H. and
Lepp
¨
anen., V. (2018). Diversification and obfuscation
techniques for software security: a systematic litera-
ture review. In Information and Software Technology.
Hung, William NN, X. S. J. T.-X. L. J. Z. R. W. and Gao.,
P. (2014). Motion planning with satisfiability mod-
ulo theories. In In Robotics and Automation (ICRA),
2014 IEEE International Conference on, pp. 113-118.
IEEE.
Keshavarz, Shahrzad, C. Y. S. G. X. X. and Holcomb., D.
(2018). Survey on applications of formal methods in
reverse engineering and intellectual property protec-
tion. In Journal of Hardware and Systems Security 2,
no. 3 (2018): 214-224.
Kirkpatrick, S. and Selman, B. (1994). Critical behavior in
the satisfiability of random boolean expressions. Sci-
ence, 264(5163):1297–1301.
Mell, P. and Grance, T. (2011). The nist definition of cloud
computing.
Niklas, E. and Niklas, S. (2004-2017). Sat4j.
Purdom, P. and Sabry, A. Cnf generator for fac-
toring problems. In https://www.cs.indiana.edu/cgi-
pub/sabry/cnf.html.
Qin, Ying, S. S. and Jia., Y. (2014). Structure-aware
cnf obfuscation for privacy-preserving sat solving.
In In Formal Methods and Models for Codesign
(MEMOCODE), 2014 Twelfth ACM/IEEE Interna-
tional Conference on, pp. 84-93. IEEE.
Qin, Ying, X. Y. S. and Du., Z. Y. (2018). Privacy-
preserving sat solving based on projection-
equivalence cnf obfuscation. In In International
Symposium on Cyberspace Safety and Security, pp.
224-239. Springer.
Rajendran, Jeyavijayan, M. S. O. S. and Karri., R. (2013).
Security analysis of integrated circuit camouflaging.
In In Proceedings of the 2013 ACM SIGSAC confer-
ence on Computer & communications security, pp.
709-720. ACM.
Rintanen, J. (2011). Planning with specialized sat solvers.
In Twenty-Fifth AAAI Conference on Artificial Intelli-
gence.
Roshanisefat, Shervin, H. M. K. and Sasan., A. (2018). Sr-
clock: Sat-resistant cyclic logic locking for protecting
the hardware. In In Proceedings of the 2018 on Great
Lakes Symposium on VLSI, pp. 153-158. ACM.
Shan, Z., Ren, K., Blanton, M., and Wang, C. (2018). Prac-
tical secure computation outsourcing: a survey. ACM
Computing Surveys (CSUR), 51(2):31.
Shen, Yuanqi, A. R. and Zhou., H. (2018). Sat-based bit-
flipping attack on logic encryptions. In In Design, Au-
tomation & Test in Europe Conference & Exhibition
(DATE), 2018, pp. 629-632. IEEE.
Tseitin, G. S. (1983). On the complexity of derivation in
propositional calculus. In In Automation of reasoning,
pp. 466-483. Springer, Berlin, Heidelberg.
Wakrime, A. A. (2017). Satisfiability-based privacy-aware
cloud computing. In The Computer Journal 60, no. 12
(2017): 1760-1769.
Wong, W. K., Cheung, D. W., Hung, E., Kao, B., and
Mamoulis, N. (2007). Security in outsourcing of asso-
ciation rule mining. In Proceedings of the 33rd inter-
national conference on Very large data bases, pages
111–122. VLDB Endowment.
Xie, Y. and Srivastava., A. (2018). Anti-sat: Mitigating
sat attack on logic locking. In IEEE Transactions
on Computer-Aided Design of Integrated Circuits and
Systems (2018).
Zhu, Yiming, A. F. S. Y. Y. Y. S. L. and Chen., Z. (2018).
New algorithm for secure outsourcing of modular ex-
ponentiation with optimal checkability based on sin-
gle untrusted server. In In 2018 IEEE International
Conference on Communications (ICC), pp. 1-6. IEEE.
Zissis, D. and Lekkas., D. (2012). Addressing cloud com-
puting security issues. In Future Generation computer
systems 28, no. 3 (2012): 583-592.
SECRYPT 2019 - 16th International Conference on Security and Cryptography
362