{"id":"https://openalex.org/W3162657489","doi":"https://doi.org/10.1109/isqed51717.2021.9424348","title":"SOMA: Security Evaluation of Obfuscation Methods via Attack Sequencing","display_name":"SOMA: Security Evaluation of Obfuscation Methods via Attack Sequencing","publication_year":2021,"publication_date":"2021-04-07","ids":{"openalex":"https://openalex.org/W3162657489","doi":"https://doi.org/10.1109/isqed51717.2021.9424348","mag":"3162657489"},"language":"en","primary_location":{"id":"doi:10.1109/isqed51717.2021.9424348","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed51717.2021.9424348","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009445152","display_name":"Abdulrahman Alaql","orcid":"https://orcid.org/0000-0002-9285-6732"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Abdulrahman Alaql","raw_affiliation_strings":["University of Florida, Gainesville, FL"],"affiliations":[{"raw_affiliation_string":"University of Florida, Gainesville, FL","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018427921","display_name":"Xinmu Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinmu Wang","raw_affiliation_strings":["University of Florida, Gainesville, FL"],"affiliations":[{"raw_affiliation_string":"University of Florida, Gainesville, FL","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100780131","display_name":"Md. Moshiur Rahman","orcid":"https://orcid.org/0000-0002-8057-2978"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Md Moshiur Rahman","raw_affiliation_strings":["University of Florida, Gainesville, FL"],"affiliations":[{"raw_affiliation_string":"University of Florida, Gainesville, FL","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039442844","display_name":"Swarup Bhunia","orcid":"https://orcid.org/0000-0001-6082-6961"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Swarup Bhunia","raw_affiliation_strings":["University of Florida, Gainesville, FL"],"affiliations":[{"raw_affiliation_string":"University of Florida, Gainesville, FL","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5009445152"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":0.2346,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.4715585,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"92","issue":null,"first_page":"381","last_page":"386"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9437642097473145},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7933892011642456},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.6975835561752319},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.6354098320007324},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6282967329025269},{"id":"https://openalex.org/keywords/soma","display_name":"Soma","score":0.6141989827156067},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5896575450897217},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42609071731567383},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.19901245832443237}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9437642097473145},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7933892011642456},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.6975835561752319},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.6354098320007324},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6282967329025269},{"id":"https://openalex.org/C2779617337","wikidata":"https://www.wikidata.org/wiki/Q842429","display_name":"Soma","level":2,"score":0.6141989827156067},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5896575450897217},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42609071731567383},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.19901245832443237},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isqed51717.2021.9424348","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed51717.2021.9424348","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Responsible consumption and production","score":0.5,"id":"https://metadata.un.org/sdg/12"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322997","display_name":"King Abdulaziz City for Science and Technology","ror":"https://ror.org/05tdz6m39"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W4983232","https://openalex.org/W1504027613","https://openalex.org/W1524250393","https://openalex.org/W2012725064","https://openalex.org/W2052353102","https://openalex.org/W2083314129","https://openalex.org/W2126693329","https://openalex.org/W2153622528","https://openalex.org/W2157661732","https://openalex.org/W2343475170","https://openalex.org/W2419784917","https://openalex.org/W2499445168","https://openalex.org/W2708742051","https://openalex.org/W2741711485","https://openalex.org/W2747980214","https://openalex.org/W2766393343","https://openalex.org/W2807607203","https://openalex.org/W2892708618","https://openalex.org/W2945305016","https://openalex.org/W2960664251","https://openalex.org/W3008907581","https://openalex.org/W6600203084","https://openalex.org/W6742287765","https://openalex.org/W6743403458"],"related_works":["https://openalex.org/W2913519194","https://openalex.org/W4362634109","https://openalex.org/W2055981842","https://openalex.org/W2793135307","https://openalex.org/W3134235726","https://openalex.org/W2906395579","https://openalex.org/W128871440","https://openalex.org/W2532550198","https://openalex.org/W4231223498","https://openalex.org/W4321192641"],"abstract_inverted_index":{"Hardware":[0],"intellectual":[1],"properties":[2],"(IPs)":[3],"used":[4,162],"in":[5,55,90],"diverse":[6],"electronic":[7],"systems":[8],"face":[9],"several":[10],"critical":[11],"security":[12,93,142],"issues":[13],"during":[14],"their":[15],"life":[16],"cycle,":[17],"including":[18],"piracy,":[19],"reverse":[20],"engineering,":[21],"and":[22,43,61,137,167],"extraction":[23],"of":[24,59,94,141,153,158,177,203],"design":[25],"secrets.":[26],"To":[27],"combat":[28],"these":[29],"issues,":[30],"pre-silicon":[31],"hardware":[32,95],"obfuscation":[33,65,81,96,147],"or":[34],"logic":[35],"locking":[36,190],"has":[37,44],"emerged":[38],"as":[39,110],"a":[40,57,87,103,122,145,151,170,178],"promising":[41],"solution":[42],"been":[45,67],"an":[46,131,199],"active":[47],"research":[48,71],"topic":[49],"over":[50],"the":[51,70,75,79,92,117,139,156,165,175],"past":[52],"decade.":[53],"However,":[54],"parallel,":[56],"number":[58],"functional":[60],"structural":[62],"attacks":[63,84,119],"on":[64,114],"have":[66,85],"discovered":[68],"by":[69,78,144],"community":[72],"to":[73,109,120,163,173,195],"break":[74,187],"protection":[76],"provided":[77],"existing":[80,118,189],"schemes.":[82,97],"These":[83],"played":[86],"major":[88,188],"role":[89],"enhancing":[91],"In":[98],"this":[99],"paper,":[100],"we":[101],"introduce":[102],"novel":[104],"combined":[105],"attack":[106,132,160,200],"modality,":[107],"referred":[108],"SOMA,":[111],"which":[112],"relies":[113],"judiciously":[115],"combining":[116],"produce":[121],"significantly":[123],"more":[124],"powerful":[125],"one.":[126],"We":[127,181],"demonstrate":[128,182],"that":[129,183,192],"such":[130],"can":[133,185],"expose":[134],"hidden":[135],"exploits":[136],"measure":[138,172],"level":[140],"offered":[143],"given":[146],"technique.":[148],"SOMA":[149,184],"creates":[150],"sequence":[152],"attacks,":[154],"where":[155],"outcome":[157],"each":[159],"is":[161],"guide":[164],"next":[166],"concludes":[168],"with":[169,198],"key-refinement":[171],"restore":[174],"functionality":[176],"locked":[179],"IP.":[180],"easily":[186],"schemes":[191],"are":[193],"believed":[194],"be":[196],"secure":[197],"accuracy":[201],"average":[202],"94.88%.":[204]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
