{"id":"https://openalex.org/W4384471459","doi":"https://doi.org/10.1007/978-3-031-37709-9_10","title":"SR-SFLL: Structurally Robust Stripped Functionality Logic Locking","display_name":"SR-SFLL: Structurally Robust Stripped Functionality Logic Locking","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4384471459","doi":"https://doi.org/10.1007/978-3-031-37709-9_10"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-37709-9_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-37709-9_10","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-37709-9_10.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-37709-9_10.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060399669","display_name":"Gourav Takhar","orcid":"https://orcid.org/0000-0002-8700-3428"},"institutions":[{"id":"https://openalex.org/I94234084","display_name":"Indian Institute of Technology Kanpur","ror":"https://ror.org/05pjsgx75","country_code":"IN","type":"education","lineage":["https://openalex.org/I94234084"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Gourav Takhar","raw_affiliation_strings":["Indian Institute of Technology Kanpur, Kanpur, India"],"raw_orcid":"https://orcid.org/0000-0002-8700-3428","affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kanpur, Kanpur, India","institution_ids":["https://openalex.org/I94234084"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014601092","display_name":"Subhajit Roy","orcid":"https://orcid.org/0000-0002-3394-023X"},"institutions":[{"id":"https://openalex.org/I94234084","display_name":"Indian Institute of Technology Kanpur","ror":"https://ror.org/05pjsgx75","country_code":"IN","type":"education","lineage":["https://openalex.org/I94234084"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Subhajit Roy","raw_affiliation_strings":["Indian Institute of Technology Kanpur, Kanpur, India"],"raw_orcid":"https://orcid.org/0000-0002-3394-023X","affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kanpur, Kanpur, India","institution_ids":["https://openalex.org/I94234084"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5060399669"],"corresponding_institution_ids":["https://openalex.org/I94234084"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":0.6667,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.94354839,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"190","last_page":"212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6685781478881836},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6643210649490356},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.5246855616569519},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38756901025772095}],"concepts":[{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6685781478881836},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6643210649490356},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.5246855616569519},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38756901025772095}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-031-37709-9_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-37709-9_10","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-37709-9_10.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-3-031-37709-9_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-37709-9_10","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-37709-9_10.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1762991518","display_name":null,"funder_award_id":"EP/V00252X/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4384471459.pdf"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W29857596","https://openalex.org/W1518705996","https://openalex.org/W1524250393","https://openalex.org/W2067276029","https://openalex.org/W2083314129","https://openalex.org/W2124954128","https://openalex.org/W2162960800","https://openalex.org/W2253205229","https://openalex.org/W2419784917","https://openalex.org/W2532376188","https://openalex.org/W2587958472","https://openalex.org/W2708742051","https://openalex.org/W2741495767","https://openalex.org/W2763166759","https://openalex.org/W2766393343","https://openalex.org/W2883980996","https://openalex.org/W2898930465","https://openalex.org/W2908124865","https://openalex.org/W2962945299","https://openalex.org/W3004024657","https://openalex.org/W3008915753","https://openalex.org/W3016319866","https://openalex.org/W3042240372","https://openalex.org/W3046767532","https://openalex.org/W3150532282","https://openalex.org/W3156365240","https://openalex.org/W3167391728","https://openalex.org/W3183146245","https://openalex.org/W3190096293","https://openalex.org/W4226162183","https://openalex.org/W4285490366","https://openalex.org/W6600903635"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2317200988","https://openalex.org/W2376932109","https://openalex.org/W2382290278","https://openalex.org/W2350741829"],"abstract_inverted_index":{"Abstract":[0],"Logic":[1],"locking":[2,18,53,81],"was":[3,55,66,75,150],"designed":[4,67],"to":[5,10,68,94,131,152,204,218,242],"be":[6,69],"a":[7,14,59,110,184,205],"formidable":[8],"barrier":[9],"IP":[11],"piracy:":[12],"given":[13],"logic":[15,17,21,52,63,80],"design,":[16],"modifies":[19],"the":[20,25,33,45,76,102,123],"design":[22,183],"such":[23,140,178],"that":[24,91,97,136,176,194,230],"circuit":[26,155],"operates":[27],"correctly":[28],"only":[29],"if":[30],"operated":[31],"with":[32],"\u201ccorrect\u201d":[34],"secret":[35],"key.":[36],"However,":[37,83],"strong":[38,60],"attacks":[39,96,201],"(like":[40],"SAT-based":[41],"attacks)":[42],"soon":[43],"exposed":[44],"weakness":[46],"of":[47,62,78,101,125,165,186],"this":[48,106,212],"defense.":[49],"Stripped":[50],"functionality":[51],"(SFLL)":[54],"recently":[56],"proposed":[57,210],"as":[58],"variant":[61,185],"locking.":[64],"SFLL":[65,115],"resilient":[70,138,241],"against":[71,139,157,198],"SAT":[72,161],"attacks,":[73,162],"which":[74],"bane":[77],"conventional":[79],"techniques.":[82],"all":[84,154,164],"SFLL-protected":[85],"designs":[86],"share":[87],"certain":[88],"\u201ccircuit":[89],"patterns\u201d":[90],"expose":[92],"them":[93,166],"new":[95,111,206],"employ":[98],"structural":[99,141,159,200,232],"analysis":[100],"locked":[103,224],"circuits.":[104],"In":[105],"work,":[107],"we":[108,174,182],"propose":[109],"methodology\u2014":[112],"Structurally":[113],"Robust":[114],"(":[116],"$$\\mathcal{S}\\mathcal{R}$$":[117,146,189,220,234],"<mml:math":[118,147,190,221,235],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"><mml:mrow><mml:mi>S</mml:mi><mml:mi>R</mml:mi></mml:mrow></mml:math>":[119,148,191,222,236],"-SFLL":[120,149,237],")\u2014that":[121],"uses":[122,215],"power":[124],"modern":[126],"satisfiability":[127],"and":[128,160],"synthesis":[129,216],"engines":[130],"produce":[132],"semantically":[133,227],"equivalent":[134,228],"circuits":[135,225],"are":[137],"attacks.":[142],"On":[143],"our":[144,187],"benchmarks,":[145],"able":[151],"defend":[153],"instances":[156],"both":[158],"while":[163],"were":[167],"broken":[168],"when":[169],"defended":[170],"using":[171],"SFLL.":[172],"Further,":[173],"show":[175],"designing":[177],"defenses":[179],"is":[180,195],"challenging:":[181],"proposal,":[188],"-SFLL(0)":[192,223],",":[193,238],"also":[196],"robust":[197],"existing":[199],"but":[202],"succumbs":[203],"attack,":[207],"SyntAk":[208,214,243],"(also":[209],"in":[211],"work).":[213],"technology":[217],"compile":[219],"into":[226],"variants":[229],"have":[231],"vulnerabilities.":[233],"however,":[239],"remains":[240],".":[244]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
