{"id":"https://openalex.org/W3032908353","doi":"https://doi.org/10.1109/access.2020.3029339","title":"A Survey on Split Manufacturing: Attacks, Defenses, and Challenges","display_name":"A Survey on Split Manufacturing: Attacks, Defenses, and Challenges","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3032908353","doi":"https://doi.org/10.1109/access.2020.3029339","mag":"3032908353"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3029339","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3029339","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09216128.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09216128.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016003223","display_name":"Tiago Perez","orcid":"https://orcid.org/0000-0001-6006-1938"},"institutions":[{"id":"https://openalex.org/I111112146","display_name":"Tallinn University of Technology","ror":"https://ror.org/0443cwa12","country_code":"EE","type":"education","lineage":["https://openalex.org/I111112146"]}],"countries":["EE"],"is_corresponding":true,"raw_author_name":"Tiago D. Perez","raw_affiliation_strings":["Centre for Hardware Security, Tallinn University of Technology (TalTech), Tallinn, Estonia"],"raw_orcid":"https://orcid.org/0000-0001-6006-1938","affiliations":[{"raw_affiliation_string":"Centre for Hardware Security, Tallinn University of Technology (TalTech), Tallinn, Estonia","institution_ids":["https://openalex.org/I111112146"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060594809","display_name":"Samuel Pagliarini","orcid":"https://orcid.org/0000-0002-5294-0606"},"institutions":[{"id":"https://openalex.org/I111112146","display_name":"Tallinn University of Technology","ror":"https://ror.org/0443cwa12","country_code":"EE","type":"education","lineage":["https://openalex.org/I111112146"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Samuel Pagliarini","raw_affiliation_strings":["Centre for Hardware Security, Tallinn University of Technology (TalTech), Tallinn, Estonia"],"raw_orcid":"https://orcid.org/0000-0002-5294-0606","affiliations":[{"raw_affiliation_string":"Centre for Hardware Security, Tallinn University of Technology (TalTech), Tallinn, Estonia","institution_ids":["https://openalex.org/I111112146"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5016003223"],"corresponding_institution_ids":["https://openalex.org/I111112146"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":5.4236,"has_fulltext":true,"cited_by_count":62,"citation_normalized_percentile":{"value":0.96502609,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"8","issue":null,"first_page":"184013","last_page":"184035"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9799000024795532,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6729727983474731},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5272741913795471},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.5204330086708069},{"id":"https://openalex.org/keywords/back-end-of-line","display_name":"Back end of line","score":0.4983835220336914},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.4768829941749573},{"id":"https://openalex.org/keywords/page-layout","display_name":"Page layout","score":0.4249556064605713},{"id":"https://openalex.org/keywords/manufacturing-engineering","display_name":"Manufacturing engineering","score":0.3860003352165222},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2502460479736328},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.21359220147132874},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17728528380393982},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13638928532600403},{"id":"https://openalex.org/keywords/interconnection","display_name":"Interconnection","score":0.13200241327285767},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11372685432434082}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6729727983474731},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5272741913795471},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.5204330086708069},{"id":"https://openalex.org/C2776628375","wikidata":"https://www.wikidata.org/wiki/Q4839229","display_name":"Back end of line","level":3,"score":0.4983835220336914},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.4768829941749573},{"id":"https://openalex.org/C188985296","wikidata":"https://www.wikidata.org/wiki/Q868954","display_name":"Page layout","level":2,"score":0.4249556064605713},{"id":"https://openalex.org/C117671659","wikidata":"https://www.wikidata.org/wiki/Q11049265","display_name":"Manufacturing engineering","level":1,"score":0.3860003352165222},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2502460479736328},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.21359220147132874},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17728528380393982},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13638928532600403},{"id":"https://openalex.org/C123745756","wikidata":"https://www.wikidata.org/wiki/Q1665949","display_name":"Interconnection","level":2,"score":0.13200241327285767},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11372685432434082},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C112698675","wikidata":"https://www.wikidata.org/wiki/Q37038","display_name":"Advertising","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2020.3029339","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3029339","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09216128.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2006.04627","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2006.04627","pdf_url":"https://arxiv.org/pdf/2006.04627","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:doaj.org/article:3356c037ab6e427f87fea3588157ff44","is_oa":true,"landing_page_url":"https://doaj.org/article/3356c037ab6e427f87fea3588157ff44","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 184013-184035 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3029339","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3029339","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09216128.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320338080","display_name":"European Social Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3032908353.pdf","grobid_xml":"https://content.openalex.org/works/W3032908353.grobid-xml"},"referenced_works_count":60,"referenced_works":["https://openalex.org/W1547478380","https://openalex.org/W1583151409","https://openalex.org/W1595368737","https://openalex.org/W1611975322","https://openalex.org/W1952517978","https://openalex.org/W1977294468","https://openalex.org/W1977545325","https://openalex.org/W1982691824","https://openalex.org/W1992964615","https://openalex.org/W1993999542","https://openalex.org/W1999944043","https://openalex.org/W2011712479","https://openalex.org/W2027484829","https://openalex.org/W2029979276","https://openalex.org/W2032186932","https://openalex.org/W2043643711","https://openalex.org/W2062036348","https://openalex.org/W2070686838","https://openalex.org/W2092545762","https://openalex.org/W2093405763","https://openalex.org/W2095410905","https://openalex.org/W2099101940","https://openalex.org/W2112813001","https://openalex.org/W2118752641","https://openalex.org/W2124618076","https://openalex.org/W2131371363","https://openalex.org/W2140904634","https://openalex.org/W2152406824","https://openalex.org/W2164152592","https://openalex.org/W2168635756","https://openalex.org/W2533892336","https://openalex.org/W2534787757","https://openalex.org/W2581875705","https://openalex.org/W2588316945","https://openalex.org/W2764108704","https://openalex.org/W2771411888","https://openalex.org/W2772235844","https://openalex.org/W2783429502","https://openalex.org/W2790776596","https://openalex.org/W2799452821","https://openalex.org/W2801941371","https://openalex.org/W2809664681","https://openalex.org/W2884748720","https://openalex.org/W2901296605","https://openalex.org/W2912029672","https://openalex.org/W2920495602","https://openalex.org/W2950680596","https://openalex.org/W2951325841","https://openalex.org/W2965079170","https://openalex.org/W3106036041","https://openalex.org/W4230202452","https://openalex.org/W4234154886","https://openalex.org/W4234937017","https://openalex.org/W4244551924","https://openalex.org/W4249050566","https://openalex.org/W4301388829","https://openalex.org/W6641116602","https://openalex.org/W6676777394","https://openalex.org/W6677721435","https://openalex.org/W6732435798"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W2132360941","https://openalex.org/W2595172197","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W2084856301","https://openalex.org/W2127970246","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W2885125400"],"abstract_inverted_index":{"In":[0,27,46,152],"today's":[1],"integrated":[2],"circuit":[3],"(IC)":[4],"ecosystem,":[5],"owning":[6],"a":[7,23,82,136,157,186],"foundry":[8],"is":[9,220],"not":[10,134],"economically":[11],"viable,":[12],"and":[13,57,99,126,194,211,254],"therefore":[14],"most":[15],"IC":[16,38],"design":[17],"houses":[18],"are":[19,61,79,117],"now":[20],"working":[21],"under":[22],"fabless":[24],"business":[25],"model.":[26],"order":[28],"to":[29,145,221,257],"overcome":[30],"security":[31,138],"concerns":[32],"associated":[33],"with":[34,149,235],"the":[35,40,49,69,89,93,161,163,179,182,190,198,202,223,261,266,269],"outsorcing":[36],"of":[37,52,72,160,166,217,264,268],"fabrication,":[39],"Split":[41,47,131,150,169,258],"Manufacturing":[42,132],"technique":[43],"was":[44],"proposed.":[45],"Manufacturing,":[48,170,259],"Front":[50],"End":[51,71],"Line":[53,73],"(FEOL)":[54],"layers":[55,75],"(transistors":[56],"lower":[58],"metal":[59,77],"layers)":[60,78],"fabricated":[62],"at":[63,81],"an":[64],"untrusted":[65,94],"high-end":[66],"foundry,":[67,95],"while":[68,196,239],"Back":[70],"(BEOL)":[74],"(higher":[76],"manufactured":[80],"trusted":[83],"low-end":[84],"foundry.":[85],"This":[86],"approach":[87],"hides":[88],"BEOL":[90,107,246],"connections":[91,108],"from":[92],"thus":[96],"preventing":[97],"overproduction":[98],"piracy":[100],"threats.":[101],"However,":[102],"many":[103,140,164,226],"works":[104],"demonstrate":[105],"that":[106,116],"can":[109,232],"be":[110,146,233],"derived":[111],"by":[112,119],"exploiting":[113],"layout":[114,212],"characteristics":[115],"introduced":[118],"heuristics":[120],"employed":[121],"in":[122,178,244],"typical":[123],"floorplanning,":[124],"placement,":[125],"routing":[127],"algorithms.":[128],"Since":[129],"straightforward":[130],"may":[133],"afford":[135],"desirable":[137],"level,":[139],"authors":[141],"propose":[142],"defense":[143,175],"techniques":[144,176],"used":[147],"along":[148],"Manufacturing.":[151],"our":[153,218],"survey,":[154],"we":[155,184,200,249],"present":[156,185],"detailed":[158],"overview":[159],"technique,":[162],"types":[165],"attacks":[167],"towards":[168],"as":[171,173],"well":[172],"possible":[174],"described":[177],"literature.":[180],"For":[181],"attacks,":[183],"concise":[187],"discussion":[188],"on":[189],"different":[191],"threat":[192],"models":[193],"assumptions,":[195],"for":[197],"defenses":[199],"classify":[201],"studies":[203,227],"into":[204],"three":[205],"categories:":[206],"proximity":[207],"perturbation,":[208],"wire":[209],"lifting,":[210],"obfuscation.":[213],"The":[214],"main":[215],"outcome":[216],"survey":[219],"highlight":[222],"discrepancy":[224],"between":[225],"-":[228],"some":[229],"claim":[230,241],"netlists":[231],"reconstructed":[234],"near":[236],"perfect":[237],"precision,":[238],"others":[240],"marginal":[242],"success":[243],"retrieving":[245],"connections.":[247],"Finally,":[248],"also":[250],"discuss":[251],"future":[252],"trends":[253],"challenges":[255],"inherent":[256],"including":[260],"fundamental":[262],"difficulty":[263],"evaluating":[265],"efficiency":[267],"technique.":[270]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":30},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":9}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
