{"id":"https://openalex.org/W4413755469","doi":"https://doi.org/10.1109/isvlsi65124.2025.11130230","title":"HardObfSec: Measuring Hardware Obfuscation Security at RTL","display_name":"HardObfSec: Measuring Hardware Obfuscation Security at RTL","publication_year":2025,"publication_date":"2025-07-06","ids":{"openalex":"https://openalex.org/W4413755469","doi":"https://doi.org/10.1109/isvlsi65124.2025.11130230"},"language":"en","primary_location":{"id":"doi:10.1109/isvlsi65124.2025.11130230","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isvlsi65124.2025.11130230","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039828435","display_name":"Sonam Sharma","orcid":"https://orcid.org/0009-0003-2160-3302"},"institutions":[{"id":"https://openalex.org/I36893310","display_name":"University of Hyderabad","ror":"https://ror.org/04a7rxb17","country_code":"IN","type":"education","lineage":["https://openalex.org/I36893310"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sonam Sharma","raw_affiliation_strings":["University of Hyderabad,Hyderabad,India"],"affiliations":[{"raw_affiliation_string":"University of Hyderabad,Hyderabad,India","institution_ids":["https://openalex.org/I36893310"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Dipanjan Roy","orcid":null},"institutions":[{"id":"https://openalex.org/I36893310","display_name":"University of Hyderabad","ror":"https://ror.org/04a7rxb17","country_code":"IN","type":"education","lineage":["https://openalex.org/I36893310"]},{"id":"https://openalex.org/I150312865","display_name":"Institute for Development and Research in Banking Technology","ror":"https://ror.org/00ta0g865","country_code":"IN","type":"government","lineage":["https://openalex.org/I150312865"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dipanjan Roy","raw_affiliation_strings":["Institute for Development & Research in Banking Technology\nHyderabad, India","University of Hyderabad,Hyderabad,India"],"affiliations":[{"raw_affiliation_string":"Institute for Development & Research in Banking Technology\nHyderabad, India","institution_ids":["https://openalex.org/I150312865"]},{"raw_affiliation_string":"University of Hyderabad,Hyderabad,India","institution_ids":["https://openalex.org/I36893310"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077158909","display_name":"Digambar Pawar","orcid":"https://orcid.org/0000-0002-1540-5647"},"institutions":[{"id":"https://openalex.org/I36893310","display_name":"University of Hyderabad","ror":"https://ror.org/04a7rxb17","country_code":"IN","type":"education","lineage":["https://openalex.org/I36893310"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Digambar Pawar","raw_affiliation_strings":["University of Hyderabad,Hyderabad,India"],"affiliations":[{"raw_affiliation_string":"University of Hyderabad,Hyderabad,India","institution_ids":["https://openalex.org/I36893310"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5039828435"],"corresponding_institution_ids":["https://openalex.org/I36893310"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33492766,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8548098206520081},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7452017664909363},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.539446234703064},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5237419605255127},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3386751711368561},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29723066091537476},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2632746398448944}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8548098206520081},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7452017664909363},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.539446234703064},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5237419605255127},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3386751711368561},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29723066091537476},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2632746398448944}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isvlsi65124.2025.11130230","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isvlsi65124.2025.11130230","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2067937469","https://openalex.org/W2293426816","https://openalex.org/W2580214734","https://openalex.org/W2770781225","https://openalex.org/W2783121464","https://openalex.org/W2789997193","https://openalex.org/W2802656234","https://openalex.org/W2907136948","https://openalex.org/W2920806881","https://openalex.org/W3093692137","https://openalex.org/W3158725657","https://openalex.org/W3161112328","https://openalex.org/W4241615935","https://openalex.org/W4292070809","https://openalex.org/W4320713241","https://openalex.org/W4321192641","https://openalex.org/W4378800917","https://openalex.org/W4379113646","https://openalex.org/W4379115682","https://openalex.org/W4379115823","https://openalex.org/W4390357582","https://openalex.org/W4403490311"],"related_works":["https://openalex.org/W4321192641","https://openalex.org/W2566543615","https://openalex.org/W2911286527","https://openalex.org/W4311080747","https://openalex.org/W4230279121","https://openalex.org/W4378501452","https://openalex.org/W2957985992","https://openalex.org/W2967173646","https://openalex.org/W2564565181","https://openalex.org/W2887002521"],"abstract_inverted_index":{"<sup":[0],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[1],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sup>Abstract-In":[2],"the":[3,71,85,147,155,167,194],"face":[4],"of":[5,52,88,111,142,193,196],"growing":[6],"threats":[7],"from":[8,123],"Reverse":[9],"Engineering":[10],"(RE)":[11],"attacks,":[12],"protecting":[13],"Integrated":[14],"Circuit":[15],"(IC)":[16],"designs":[17,198],"has":[18],"become":[19],"paramount.":[20],"Hardware":[21],"obfuscation":[22,53,89,115,143,149],"stands":[23],"out":[24],"as":[25,91,97],"a":[26,33,136,188],"powerful":[27],"defense":[28],"mechanism":[29],"by":[30,102,172],"deliberately":[31],"modifying":[32],"circuit\u2019s":[34,156],"functional":[35,62],"behavior,":[36],"making":[37],"it":[38,165],"significantly":[39],"more":[40],"challenging":[41],"for":[42,139],"adversaries":[43,122],"to":[44,59,83],"extract":[45],"its":[46,57,76],"true":[47],"functionality.":[48],"A":[49],"key":[50,94],"aspect":[51],"effectiveness":[54],"lies":[55],"in":[56],"ability":[58],"generate":[60],"multiple":[61],"variations,":[63],"among":[64],"which":[65],"only":[66],"one":[67],"is":[68],"correct,":[69],"while":[70],"others":[72],"mislead":[73],"attackers.":[74],"Despite":[75],"significance,":[77],"traditional":[78],"evaluation":[79],"metrics":[80],"often":[81],"fail":[82],"capture":[84],"full":[86],"extent":[87],"effectiveness,":[90],"they":[92],"overlook":[93],"aspects":[95],"such":[96],"complexity,":[98,119,168],"and":[99,120,151,162,169,174,190],"ambiguity":[100,170],"introduced":[101,171],"generating":[103],"misleading":[104],"functionalities.":[105],"This":[106,185],"limitation":[107],"hinders":[108],"accurate":[109],"assessment":[110,141],"how":[112,176],"well":[113],"an":[114,180],"technique":[116],"increases":[117],"circuit":[118],"prevents":[121],"extracting":[124],"meaningful":[125],"design":[126,182],"information.":[127],"To":[128],"address":[129],"this":[130,132],"gap,":[131],"paper":[133],"introduces":[134],"HardObfSec,":[135],"novel":[137],"metric":[138,186],"holistic":[140],"robustness.":[144],"HardObfSec":[145],"evaluates":[146],"applied":[148],"attributes,":[150],"their":[152],"impact":[153],"on":[154],"structural":[157],"attributes.":[158],"By":[159],"quantifying":[160],"data,":[161],"operation":[163],"obscurity,":[164],"measures":[166],"obfuscation,":[173],"determines":[175],"many":[177],"distinct":[178],"functionalities":[179],"obfuscated":[181,197],"can":[183],"generate.":[184],"offers":[187],"precise,":[189],"reliable":[191],"measure":[192],"resilience":[195],"against":[199],"RE":[200],"attacks.":[201]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
