{"id":"https://openalex.org/W3041385400","doi":"https://doi.org/10.1109/isqed48828.2020.9137003","title":"On Securing Scan Obfuscation Strategies Against ScanSAT Attack","display_name":"On Securing Scan Obfuscation Strategies Against ScanSAT Attack","publication_year":2020,"publication_date":"2020-03-01","ids":{"openalex":"https://openalex.org/W3041385400","doi":"https://doi.org/10.1109/isqed48828.2020.9137003","mag":"3041385400"},"language":"en","primary_location":{"id":"doi:10.1109/isqed48828.2020.9137003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed48828.2020.9137003","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030502691","display_name":"Rajit Karmakar","orcid":"https://orcid.org/0000-0001-7346-4955"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rajit Karmakar","raw_affiliation_strings":["Department of E&ECE, Indian Institute of Technology, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Department of E&ECE, Indian Institute of Technology, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077947010","display_name":"Santanu Chattopadhyay","orcid":"https://orcid.org/0000-0002-1227-0732"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Santanu Chattopadhyay","raw_affiliation_strings":["Department of E&ECE, Indian Institute of Technology, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Department of E&ECE, Indian Institute of Technology, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030502691"],"corresponding_institution_ids":["https://openalex.org/I145894827"],"apc_list":null,"apc_paid":null,"fwci":1.1552,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.7659698,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"213","last_page":"218"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9675999879837036,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9541019201278687},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7393698692321777},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7200188636779785},{"id":"https://openalex.org/keywords/controllability","display_name":"Controllability","score":0.6248409152030945},{"id":"https://openalex.org/keywords/observability","display_name":"Observability","score":0.623450756072998},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6166781783103943},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5923956036567688},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.44703027606010437},{"id":"https://openalex.org/keywords/sequential-logic","display_name":"Sequential logic","score":0.44142186641693115},{"id":"https://openalex.org/keywords/scan-chain","display_name":"Scan chain","score":0.416730135679245},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.37934133410453796},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.35041552782058716},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3012177050113678},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20621994137763977},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.13717201352119446}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9541019201278687},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7393698692321777},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7200188636779785},{"id":"https://openalex.org/C48209547","wikidata":"https://www.wikidata.org/wiki/Q1331104","display_name":"Controllability","level":2,"score":0.6248409152030945},{"id":"https://openalex.org/C36299963","wikidata":"https://www.wikidata.org/wiki/Q1369844","display_name":"Observability","level":2,"score":0.623450756072998},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6166781783103943},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5923956036567688},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.44703027606010437},{"id":"https://openalex.org/C187075797","wikidata":"https://www.wikidata.org/wiki/Q173245","display_name":"Sequential logic","level":3,"score":0.44142186641693115},{"id":"https://openalex.org/C150012182","wikidata":"https://www.wikidata.org/wiki/Q225990","display_name":"Scan chain","level":3,"score":0.416730135679245},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.37934133410453796},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.35041552782058716},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3012177050113678},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20621994137763977},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.13717201352119446},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C28826006","wikidata":"https://www.wikidata.org/wiki/Q33521","display_name":"Applied mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isqed48828.2020.9137003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed48828.2020.9137003","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1524250393","https://openalex.org/W2008819052","https://openalex.org/W2012725064","https://openalex.org/W2025669099","https://openalex.org/W2085362698","https://openalex.org/W2141624968","https://openalex.org/W2142537526","https://openalex.org/W2343475170","https://openalex.org/W2419784917","https://openalex.org/W2499445168","https://openalex.org/W2526914141","https://openalex.org/W2587958472","https://openalex.org/W2600888622","https://openalex.org/W2615060729","https://openalex.org/W2616325639","https://openalex.org/W2708742051","https://openalex.org/W2741711485","https://openalex.org/W2766393343","https://openalex.org/W2769905020","https://openalex.org/W2771405182","https://openalex.org/W2782827709","https://openalex.org/W2791567389","https://openalex.org/W2800704481","https://openalex.org/W2903107655","https://openalex.org/W2942805026","https://openalex.org/W2942872003","https://openalex.org/W2944122409","https://openalex.org/W2945226337","https://openalex.org/W2972308582","https://openalex.org/W2996950687","https://openalex.org/W4254690223","https://openalex.org/W6681113282","https://openalex.org/W6704292781","https://openalex.org/W6724703443","https://openalex.org/W6733632429","https://openalex.org/W6762830639"],"related_works":["https://openalex.org/W2130364905","https://openalex.org/W4386374027","https://openalex.org/W2010452589","https://openalex.org/W1548096828","https://openalex.org/W2787358728","https://openalex.org/W2151102355","https://openalex.org/W2131499522","https://openalex.org/W2057961029","https://openalex.org/W2513553310","https://openalex.org/W2094057173"],"abstract_inverted_index":{"Logic":[0],"encryption":[1,20],"is":[2,39],"a":[3,59,79,115,144],"potential":[4],"solution":[5],"to":[6,24,32,40,77,93,149],"the":[7,18,25,42,47,51,55,95,98,104,129,132,150],"ever-increasing":[8],"problem":[9],"of":[10,17,46,50,97,106,131],"IP":[11,130],"piracy":[12],"and":[13,44],"counterfeiting.":[14],"However,":[15,58],"most":[16],"logic":[19],"techniques":[21],"are":[22],"vulnerable":[23],"powerful":[26],"SAT":[27,34,87,120],"attack.":[28,100],"One":[29],"possible":[30],"way":[31],"prevent":[33],"attack":[35,61],"on":[36],"sequential":[37],"circuits":[38],"restrict":[41],"controllability":[43],"observability":[45],"internal":[48],"states":[49],"flip-flop":[52],"by":[53,109],"obfuscating":[54],"scan":[56,67,117],"operation.":[57],"recent":[60,116],"called":[62],"ScanSAT":[63,99],"can":[64],"break":[65],"these":[66],"obfuscation":[68,118],"guided":[69,119],"defense":[70],"mechanisms.":[71],"In":[72],"this":[73],"paper,":[74],"we":[75],"propose":[76],"integrate":[78],"lightweight":[80],"test":[81],"authentication":[82],"mechanism":[83],"with":[84,112],"such":[85],"baseline":[86],"preventive":[88,121],"strategies,":[89],"which":[90],"enables":[91],"us":[92],"withstand":[94],"threat":[96],"We":[101],"have":[102],"shown":[103],"strength":[105],"our":[107],"approach":[108,125],"integrating":[110],"it":[111],"Encrypt":[113],"Flip-Flop,":[114],"approach.":[122],"The":[123],"proposed":[124],"not":[126],"only":[127],"protects":[128],"design":[133],"but":[134],"also":[135],"offers":[136],"protection":[137],"against":[138],"scan-based":[139],"side":[140],"channel":[141],"attacks":[142],"at":[143],"much":[145],"lower":[146],"cost":[147],"compared":[148],"existing":[151],"methods.":[152]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
