{"id":"https://openalex.org/W4320025547","doi":"https://doi.org/10.1109/asianhost56390.2022.10022175","title":"On the Limitations of Logic Locking the Approximate Circuits","display_name":"On the Limitations of Logic Locking the Approximate Circuits","publication_year":2022,"publication_date":"2022-12-14","ids":{"openalex":"https://openalex.org/W4320025547","doi":"https://doi.org/10.1109/asianhost56390.2022.10022175"},"language":"en","primary_location":{"id":"doi:10.1109/asianhost56390.2022.10022175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asianhost56390.2022.10022175","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040861793","display_name":"Kartik Nayak","orcid":"https://orcid.org/0000-0001-5675-263X"},"institutions":[{"id":"https://openalex.org/I57201433","display_name":"Universit\u00e0 della Svizzera italiana","ror":"https://ror.org/03c4atk17","country_code":"CH","type":"education","lineage":["https://openalex.org/I57201433"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Kartik Nayak","raw_affiliation_strings":["Universit&#x00E0; della Svizzera italiana,Lugano,Switzerland"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E0; della Svizzera italiana,Lugano,Switzerland","institution_ids":["https://openalex.org/I57201433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045418076","display_name":"Devanshi Upadhyaya","orcid":null},"institutions":[{"id":"https://openalex.org/I100066346","display_name":"University of Stuttgart","ror":"https://ror.org/04vnq7t77","country_code":"DE","type":"education","lineage":["https://openalex.org/I100066346"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Devanshi Upadhyaya","raw_affiliation_strings":["University of Stuttgart,Stuttgart,Germany","University of Stuttgart, Stuttgart, Germany"],"affiliations":[{"raw_affiliation_string":"University of Stuttgart,Stuttgart,Germany","institution_ids":["https://openalex.org/I100066346"]},{"raw_affiliation_string":"University of Stuttgart, Stuttgart, Germany","institution_ids":["https://openalex.org/I100066346"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049456178","display_name":"Francesco Regazzoni","orcid":"https://orcid.org/0000-0001-6385-0780"},"institutions":[{"id":"https://openalex.org/I57201433","display_name":"Universit\u00e0 della Svizzera italiana","ror":"https://ror.org/03c4atk17","country_code":"CH","type":"education","lineage":["https://openalex.org/I57201433"]},{"id":"https://openalex.org/I4210135670","display_name":"Amsterdam University of the Arts","ror":"https://ror.org/04dde1554","country_code":"NL","type":"education","lineage":["https://openalex.org/I4210135670"]},{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]}],"countries":["CH","NL"],"is_corresponding":false,"raw_author_name":"Francesco Regazzoni","raw_affiliation_strings":["Universit&#x00E0; della Svizzera italiana,Lugano,Switzerland","University of Amsterdam, Amsterdam, Netherlands"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E0; della Svizzera italiana,Lugano,Switzerland","institution_ids":["https://openalex.org/I57201433"]},{"raw_affiliation_string":"University of Amsterdam, Amsterdam, Netherlands","institution_ids":["https://openalex.org/I4210135670","https://openalex.org/I887064364"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027416202","display_name":"Ilia Polian","orcid":"https://orcid.org/0000-0002-6563-2725"},"institutions":[{"id":"https://openalex.org/I100066346","display_name":"University of Stuttgart","ror":"https://ror.org/04vnq7t77","country_code":"DE","type":"education","lineage":["https://openalex.org/I100066346"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ilia Polian","raw_affiliation_strings":["University of Stuttgart,Stuttgart,Germany","University of Stuttgart, Stuttgart, Germany"],"affiliations":[{"raw_affiliation_string":"University of Stuttgart,Stuttgart,Germany","institution_ids":["https://openalex.org/I100066346"]},{"raw_affiliation_string":"University of Stuttgart, Stuttgart, Germany","institution_ids":["https://openalex.org/I100066346"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5040861793"],"corresponding_institution_ids":["https://openalex.org/I57201433"],"apc_list":null,"apc_paid":null,"fwci":0.6986,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.69922228,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10472","display_name":"Semiconductor materials and devices","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7901059985160828},{"id":"https://openalex.org/keywords/adder","display_name":"Adder","score":0.6175445914268494},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.5213854908943176},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.46213430166244507},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.44468677043914795},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4324004054069519},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.43200838565826416},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.4224015474319458},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38649702072143555},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.3635612726211548},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34936124086380005},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22948512434959412},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1331287920475006},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12036779522895813},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.11368963122367859},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.0890541672706604}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7901059985160828},{"id":"https://openalex.org/C164620267","wikidata":"https://www.wikidata.org/wiki/Q376953","display_name":"Adder","level":3,"score":0.6175445914268494},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.5213854908943176},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.46213430166244507},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.44468677043914795},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4324004054069519},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.43200838565826416},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.4224015474319458},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38649702072143555},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.3635612726211548},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34936124086380005},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22948512434959412},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1331287920475006},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12036779522895813},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.11368963122367859},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0890541672706604},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/asianhost56390.2022.10022175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asianhost56390.2022.10022175","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"},{"id":"pmh:oai:dare.uva.nl:openaire_cris_publications/2fd04acd-cf23-4452-b09f-1ee446d43e46","is_oa":false,"landing_page_url":"https://handle.uba.uva.nl/personal/pure/en/publications/on-the-limitations-of-logic-locking-the-approximate-circuits(2fd04acd-cf23-4452-b09f-1ee446d43e46).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400088","display_name":"UvA-DARE (University of Amsterdam)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I887064364","host_organization_name":"University of Amsterdam","host_organization_lineage":["https://openalex.org/I887064364"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Nayak, K, Upadhyaya, D, Regazzoni, F & Polian, I 2022, On the Limitations of Logic Locking the Approximate Circuits. in Proceedings of the 2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) : 14-16 December 2022, Singapore. Piscataway, NJ, pp. 107-112, 2022 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2022, Virtual, Online, Singapore, 14/12/22. https://doi.org/10.1109/AsianHOST56390.2022.10022175","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:dare.uva.nl:publications/2fd04acd-cf23-4452-b09f-1ee446d43e46","is_oa":false,"landing_page_url":"https://hdl.handle.net/11245.1/2fd04acd-cf23-4452-b09f-1ee446d43e46","pdf_url":null,"source":{"id":"https://openalex.org/S4306400088","display_name":"UvA-DARE (University of Amsterdam)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I887064364","host_organization_name":"University of Amsterdam","host_organization_lineage":["https://openalex.org/I887064364"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Nayak, K, Upadhyaya, D, Regazzoni, F & Polian, I 2022, On the Limitations of Logic Locking the Approximate Circuits. in Proceedings of the 2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) : 14-16 December 2022, Singapore. Piscataway, NJ, pp. 107-112, 2022 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2022, Virtual, Online, Singapore, 14/12/22. https://doi.org/10.1109/AsianHOST56390.2022.10022175","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8199999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1524250393","https://openalex.org/W2008819052","https://openalex.org/W2017819499","https://openalex.org/W2064541558","https://openalex.org/W2083314129","https://openalex.org/W2099101940","https://openalex.org/W2106484393","https://openalex.org/W2129394555","https://openalex.org/W2135089667","https://openalex.org/W2144024329","https://openalex.org/W2157661732","https://openalex.org/W2171865342","https://openalex.org/W2265166184","https://openalex.org/W2419784917","https://openalex.org/W2626492933","https://openalex.org/W2742536119","https://openalex.org/W2766393343","https://openalex.org/W2790282160","https://openalex.org/W2871705258","https://openalex.org/W2900220203","https://openalex.org/W2950285720","https://openalex.org/W3040839314","https://openalex.org/W3088175788","https://openalex.org/W3096150904","https://openalex.org/W3106433382","https://openalex.org/W3117152020","https://openalex.org/W3129056223","https://openalex.org/W3144137741","https://openalex.org/W3157997952","https://openalex.org/W4231363479","https://openalex.org/W4247267706","https://openalex.org/W4252100403"],"related_works":["https://openalex.org/W4390550886","https://openalex.org/W3217463396","https://openalex.org/W2790557758","https://openalex.org/W2516396101","https://openalex.org/W3204929712","https://openalex.org/W4295102875","https://openalex.org/W2300671402","https://openalex.org/W2015457513","https://openalex.org/W1993041309","https://openalex.org/W4312888585"],"abstract_inverted_index":{"Approximate":[0],"Computing":[1],"(AxC)":[2],"is":[3],"an":[4,112,129],"emerging":[5],"architectural":[6],"paradigm,":[7],"which":[8],"promises":[9],"improvements":[10],"in":[11,29,151],"area,":[12],"performance":[13],"or":[14],"power":[15],"consumption":[16],"at":[17,142],"the":[18,61,75,98,106,121,143],"expense":[19],"of":[20,25,63,77,97,108,120,145],"limited":[21],"and":[22,40,59,148,150],"tolerable":[23],"inaccuracies":[24],"computations.":[26],"Circuits":[27],"designed":[28],"typical":[30],"AxC-friendly":[31],"applications,":[32],"such":[33],"as":[34],"neural":[35],"network":[36,156],"accelerators,":[37],"visual":[38],"computing":[39],"high-bandwidth":[41],"communication,":[42],"are":[43,91],"vulnerable":[44],"to":[45,116],"supply-chain":[46],"attacks.":[47],"In":[48],"this":[49,140],"paper,":[50],"we":[51,104],"investigate":[52],"logic":[53,78,109],"locking-a":[54],"protective":[55],"technique":[56],"against":[57,111],"counterfeiting":[58],"overbuilding-in":[60],"context":[62],"AxC":[64,81],"arithmetic":[65],"primitives.":[66],"We":[67,84,126],"discuss":[68],"a":[69,118,152],"threat":[70],"model":[71],"that":[72,86,128],"can":[73,133],"hinder":[74],"adoption":[76],"locking":[79,89,110,123],"on":[80],"based":[82],"ICs.":[83],"show":[85,127],"modern":[87],"SAT-resilient":[88],"techniques":[90],"unsuitable":[92],"for":[93],"approximate":[94,159],"circuits":[95],"because":[96],"low":[99],"output":[100],"corruption":[101],"problem.":[102],"Moreover,":[103],"explore":[105],"resistance":[107],"attacker":[113],"who":[114],"managed":[115],"obtain":[117],"subset":[119],"correct":[122],"key's":[124],"bits.":[125],"incorrectly":[130],"unlocked":[131],"circuit":[132],"still":[134],"produce":[135],"acceptable":[136],"results,":[137],"experimentally":[138],"verifying":[139],"both":[141],"level":[144],"primitives":[146],"(adders":[147],"multipliers)":[149],"full":[153],"application":[154],"(neural":[155],"inference":[157],"with":[158],"multiply-accumulate":[160],"units).":[161]},"counts_by_year":[{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-16T09:10:04.655348","created_date":"2025-10-10T00:00:00"}
