{"id":"https://openalex.org/W2757400610","doi":"https://doi.org/10.1109/iscas.2017.8050606","title":"Revisit sequential logic obfuscation: Attacks and defenses","display_name":"Revisit sequential logic obfuscation: Attacks and defenses","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2757400610","doi":"https://doi.org/10.1109/iscas.2017.8050606","mag":"2757400610"},"language":"en","primary_location":{"id":"doi:10.1109/iscas.2017.8050606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas.2017.8050606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://stars.library.ucf.edu/scopus2015/6638","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020816244","display_name":"Travis Meade","orcid":"https://orcid.org/0009-0000-1001-4789"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Travis Meade","raw_affiliation_strings":["Department of Computer Science, University of Central Florida"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Central Florida","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002117195","display_name":"Zheng Zhao","orcid":"https://orcid.org/0000-0001-9505-7189"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zheng Zhao","raw_affiliation_strings":["Department of Computer Science, University of Central Florida"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Central Florida","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100768909","display_name":"Shaojie Zhang","orcid":"https://orcid.org/0000-0002-4051-5549"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shaojie Zhang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Texas at Austin"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Texas at Austin","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011883763","display_name":"David Z. Pan","orcid":"https://orcid.org/0000-0002-5705-2501"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Pan","raw_affiliation_strings":["University of Texas at Austin, Austin, TX, US"],"affiliations":[{"raw_affiliation_string":"University of Texas at Austin, Austin, TX, US","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017464942","display_name":"Yier Jin","orcid":"https://orcid.org/0000-0002-8791-0597"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yier Jin","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of of Central Florida"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of of Central Florida","institution_ids":["https://openalex.org/I106165777"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5020816244"],"corresponding_institution_ids":["https://openalex.org/I106165777"],"apc_list":null,"apc_paid":null,"fwci":7.1797,"has_fulltext":false,"cited_by_count":74,"citation_normalized_percentile":{"value":0.97972117,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9584000110626221,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9174784421920776},{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.8336467742919922},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7552407383918762},{"id":"https://openalex.org/keywords/sequential-logic","display_name":"Sequential logic","score":0.5935183763504028},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.5563837885856628},{"id":"https://openalex.org/keywords/combinational-logic","display_name":"Combinational logic","score":0.4603237211704254},{"id":"https://openalex.org/keywords/logic-optimization","display_name":"Logic optimization","score":0.4225081205368042},{"id":"https://openalex.org/keywords/logic-synthesis","display_name":"Logic synthesis","score":0.3964638113975525},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3632321059703827},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2827416658401489},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27028852701187134},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.23260706663131714}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9174784421920776},{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.8336467742919922},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7552407383918762},{"id":"https://openalex.org/C187075797","wikidata":"https://www.wikidata.org/wiki/Q173245","display_name":"Sequential logic","level":3,"score":0.5935183763504028},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.5563837885856628},{"id":"https://openalex.org/C81409106","wikidata":"https://www.wikidata.org/wiki/Q76505","display_name":"Combinational logic","level":3,"score":0.4603237211704254},{"id":"https://openalex.org/C28449271","wikidata":"https://www.wikidata.org/wiki/Q6667469","display_name":"Logic optimization","level":4,"score":0.4225081205368042},{"id":"https://openalex.org/C157922185","wikidata":"https://www.wikidata.org/wiki/Q173198","display_name":"Logic synthesis","level":3,"score":0.3964638113975525},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3632321059703827},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2827416658401489},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27028852701187134},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.23260706663131714}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iscas.2017.8050606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas.2017.8050606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},{"id":"pmh:oai:stars.library.ucf.edu:scopus2015-7637","is_oa":true,"landing_page_url":"https://stars.library.ucf.edu/scopus2015/6638","pdf_url":null,"source":{"id":"https://openalex.org/S4210172555","display_name":"Journal of International Crisis and Risk Communication Research","issn_l":"2576-0017","issn":["2576-0017","2576-0025"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Export 2015-2019","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:stars.library.ucf.edu:scopus2015-7637","is_oa":true,"landing_page_url":"https://stars.library.ucf.edu/scopus2015/6638","pdf_url":null,"source":{"id":"https://openalex.org/S4210172555","display_name":"Journal of International Crisis and Risk Communication Research","issn_l":"2576-0017","issn":["2576-0017","2576-0025"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Export 2015-2019","raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1524250393","https://openalex.org/W2010903499","https://openalex.org/W2012725064","https://openalex.org/W2028329758","https://openalex.org/W2042778609","https://openalex.org/W2052353102","https://openalex.org/W2054999246","https://openalex.org/W2067276029","https://openalex.org/W2085992264","https://openalex.org/W2088898213","https://openalex.org/W2091656296","https://openalex.org/W2118382442","https://openalex.org/W2124928244","https://openalex.org/W2135211381","https://openalex.org/W2156692142","https://openalex.org/W2166512883","https://openalex.org/W2293426816","https://openalex.org/W2403248509","https://openalex.org/W2419784917","https://openalex.org/W2516244851","https://openalex.org/W2536656707","https://openalex.org/W4242104909"],"related_works":["https://openalex.org/W1939541994","https://openalex.org/W818963952","https://openalex.org/W2499931839","https://openalex.org/W2110968362","https://openalex.org/W4390345338","https://openalex.org/W4238178324","https://openalex.org/W2169337913","https://openalex.org/W2071237164","https://openalex.org/W1702800398","https://openalex.org/W2356822490"],"abstract_inverted_index":{"The":[0],"urgent":[1],"requests":[2],"to":[3,15,66],"protection":[4],"integrated":[5],"circuits":[6,51,70],"(IC)":[7],"and":[8,83],"hardware":[9],"intellectual":[10],"properties":[11],"(IP)":[12],"have":[13],"led":[14],"the":[16,29,44],"development":[17],"of":[18,46],"various":[19],"logic":[20,31,34,48,90],"obfuscation":[21,49,91],"methods.":[22],"While":[23],"most":[24],"existing":[25],"solutions":[26,82],"focus":[27],"on":[28],"combinational":[30],"or":[32,58],"sequential":[33,47,69,89],"with":[35],"full":[36,53],"scan-chains,":[37],"in":[38,86],"this":[39],"paper,":[40],"we":[41],"will":[42,61,78],"revisit":[43],"security":[45],"within":[50],"where":[52],"scan-chains":[54],"are":[55],"not":[56],"available":[57],"accessible.":[59],"We":[60,77],"first":[62],"introduce":[63],"attack":[64],"methods":[65],"compromise":[67],"obfuscated":[68],"leveraging":[71],"newly":[72],"developed":[73],"netlist":[74],"analysis":[75],"tools.":[76],"then":[79],"propose":[80],"systematic":[81],"provide":[84],"guidelines":[85],"developing":[87],"resilient":[88],"schemes.":[92]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":17},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
