{"id":"https://openalex.org/W4399396330","doi":"https://doi.org/10.1109/host55342.2024.10545388","title":"DOSCrack: Deobfuscation Using Oracle-Guided Symbolic Execution and Clustering of Binary Security Keys","display_name":"DOSCrack: Deobfuscation Using Oracle-Guided Symbolic Execution and Clustering of Binary Security Keys","publication_year":2024,"publication_date":"2024-05-06","ids":{"openalex":"https://openalex.org/W4399396330","doi":"https://doi.org/10.1109/host55342.2024.10545388"},"language":"en","primary_location":{"id":"doi:10.1109/host55342.2024.10545388","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/host55342.2024.10545388","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045095419","display_name":"Jiaming Wu","orcid":"https://orcid.org/0000-0001-6533-8780"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jiaming Wu","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040726498","display_name":"Olivia P. Dizon-Paradis","orcid":"https://orcid.org/0000-0002-6879-8624"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Olivia Dizon-Paradis","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102401112","display_name":"Sazadur Rahman","orcid":null},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sazadur Rahman","raw_affiliation_strings":["University of Central Florida"],"affiliations":[{"raw_affiliation_string":"University of Central Florida","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055751228","display_name":"Damon L. Woodard","orcid":"https://orcid.org/0000-0002-0471-177X"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Damon Woodard","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009243659","display_name":"Domenic Forte","orcid":"https://orcid.org/0000-0002-2794-7320"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Domenic Forte","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5045095419"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":0.9895,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72555639,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"227","last_page":"232"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9733999967575073,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8012186884880066},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.6235490441322327},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6072062849998474},{"id":"https://openalex.org/keywords/satisfiability-modulo-theories","display_name":"Satisfiability modulo theories","score":0.5990094542503357},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5717149972915649},{"id":"https://openalex.org/keywords/scan-chain","display_name":"Scan chain","score":0.5568493604660034},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45844554901123047},{"id":"https://openalex.org/keywords/testability","display_name":"Testability","score":0.4245580732822418},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3337777853012085},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.32339200377464294},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15310138463974},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1363869309425354},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.11297911405563354}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8012186884880066},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.6235490441322327},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6072062849998474},{"id":"https://openalex.org/C164155591","wikidata":"https://www.wikidata.org/wiki/Q2067766","display_name":"Satisfiability modulo theories","level":2,"score":0.5990094542503357},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5717149972915649},{"id":"https://openalex.org/C150012182","wikidata":"https://www.wikidata.org/wiki/Q225990","display_name":"Scan chain","level":3,"score":0.5568493604660034},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45844554901123047},{"id":"https://openalex.org/C51234621","wikidata":"https://www.wikidata.org/wiki/Q2149495","display_name":"Testability","level":2,"score":0.4245580732822418},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3337777853012085},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.32339200377464294},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15310138463974},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1363869309425354},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.11297911405563354},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/host55342.2024.10545388","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/host55342.2024.10545388","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1524250393","https://openalex.org/W1548096828","https://openalex.org/W1931458304","https://openalex.org/W2010452589","https://openalex.org/W2010903499","https://openalex.org/W2616454726","https://openalex.org/W4231486519","https://openalex.org/W4318037433","https://openalex.org/W4320025022","https://openalex.org/W6768636326"],"related_works":["https://openalex.org/W2995488812","https://openalex.org/W2010452589","https://openalex.org/W2765347974","https://openalex.org/W2287565210","https://openalex.org/W2184716478","https://openalex.org/W3128730542","https://openalex.org/W2399578172","https://openalex.org/W2143744897","https://openalex.org/W4210813503","https://openalex.org/W4238968567"],"abstract_inverted_index":{"Design-for-test/debug(DfT/D)":[0],"introduces":[1],"scan":[2,13,17,34,86],"chain":[3],"testing":[4],"to":[5,22,39,61,77,97,109,141,195],"increase":[6],"testability":[7],"and":[8,50,67,160,164,180,187,198],"fault":[9],"coverage":[10],"by":[11,46],"inserting":[12],"flip-flops.":[14],"However,":[15],"these":[16],"chains":[18,35],"are":[19],"also":[20],"known":[21],"be":[23],"a":[24,78,113],"liability":[25],"for":[26,183],"security":[27],"primitives.":[28],"In":[29,52],"previous":[30],"research,":[31],"dynamically":[32],"obfuscated":[33],"(DOSC)":[36],"were":[37],"introduced":[38],"protect":[40],"logic-locking":[41],"keys":[42],"from":[43],"scan-based":[44,203],"attacks":[45],"obscuring":[47],"test":[48],"patterns":[49,140],"responses.":[51],"this":[53],"paper,":[54],"we":[55],"present":[56],"DOSCrack,":[57],"an":[58],"oracle-guided":[59],"attack":[60],"de-obfuscate":[62],"DOSC":[63,158],"using":[64],"symbolic":[65,82],"execution":[66,83],"binary":[68],"clustering,":[69],"which":[70,134],"significantly":[71],"reduces":[72],"the":[73,99,127,193],"candidate":[74],"seed":[75,101],"space":[76],"manageable":[79],"quantity.":[80],"Our":[81,166,190],"engine":[84],"employs":[85],"mode":[87],"simulation":[88,139],"as":[89,91],"well":[90],"satisfiability":[92],"modulo":[93],"theories":[94],"(SMT)":[95],"solvers":[96],"reduce":[98],"possible":[100],"space,":[102],"while":[103],"obfuscation":[104,145,174],"key":[105],"clustering":[106],"allows":[107],"us":[108],"effectively":[110,168],"rule":[111],"out":[112],"group":[114],"of":[115,123,129,157],"seeds":[116],"that":[117],"share":[118],"similarities.":[119],"An":[120],"integral":[121],"component":[122],"our":[124,150],"approach":[125],"is":[126],"use":[128],"sequential":[130],"equivalence":[131],"checking":[132],"(SEC),":[133],"aids":[135],"in":[136,172],"identifying":[137],"distinct":[138],"differentiate":[142],"between":[143],"potential":[144],"keys.":[146],"We":[147],"experimentally":[148],"applied":[149],"DOSCrack":[151],"framework":[152,191],"on":[153],"four":[154],"different":[155],"sizes":[156],"benchmarks":[159],"compared":[161],"their":[162],"run-time":[163],"complexity.":[165],"research":[167,186],"addresses":[169],"critical":[170],"vulnerabilities":[171],"scan-chain":[173],"methodologies,":[175],"offering":[176],"insights":[177],"into":[178],"DfT/D":[179],"logic":[181],"locking":[182],"both":[184],"academic":[185],"industrial":[188],"applications.":[189],"emphasizes":[192],"need":[194],"craft":[196],"robust":[197],"adaptable":[199],"defense":[200],"mechanisms":[201],"against":[202],"attacks.":[204]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-24T08:02:53.985720","created_date":"2025-10-10T00:00:00"}
