{"id":"https://openalex.org/W2609004879","doi":"https://doi.org/10.1109/latw.2017.7906739","title":"Protecting analog circuits with parameter biasing obfuscation","display_name":"Protecting analog circuits with parameter biasing obfuscation","publication_year":2017,"publication_date":"2017-03-01","ids":{"openalex":"https://openalex.org/W2609004879","doi":"https://doi.org/10.1109/latw.2017.7906739","mag":"2609004879"},"language":"en","primary_location":{"id":"doi:10.1109/latw.2017.7906739","is_oa":false,"landing_page_url":"https://doi.org/10.1109/latw.2017.7906739","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 18th IEEE Latin American Test Symposium (LATS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022476194","display_name":"Vaibhav Venugopal Rao","orcid":"https://orcid.org/0000-0002-9369-1730"},"institutions":[{"id":"https://openalex.org/I72816309","display_name":"Drexel University","ror":"https://ror.org/04bdffz58","country_code":"US","type":"education","lineage":["https://openalex.org/I72816309"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vaibhav Venugopal Rao","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Drexel University, Philadelphia, PA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Drexel University, Philadelphia, PA","institution_ids":["https://openalex.org/I72816309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059641297","display_name":"Ioannis Savidis","orcid":"https://orcid.org/0000-0003-4230-1795"},"institutions":[{"id":"https://openalex.org/I72816309","display_name":"Drexel University","ror":"https://ror.org/04bdffz58","country_code":"US","type":"education","lineage":["https://openalex.org/I72816309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ioannis Savidis","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Drexel University, Philadelphia, PA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Drexel University, Philadelphia, PA","institution_ids":["https://openalex.org/I72816309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5022476194"],"corresponding_institution_ids":["https://openalex.org/I72816309"],"apc_list":null,"apc_paid":null,"fwci":4.5063,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.95928087,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.7842517495155334},{"id":"https://openalex.org/keywords/phase-locked-loop","display_name":"Phase-locked loop","score":0.695428729057312},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6658851504325867},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.631868302822113},{"id":"https://openalex.org/keywords/dbc","display_name":"dBc","score":0.529448926448822},{"id":"https://openalex.org/keywords/phase-noise","display_name":"Phase noise","score":0.48371627926826477},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4385156035423279},{"id":"https://openalex.org/keywords/biasing","display_name":"Biasing","score":0.4271446764469147},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3676965832710266},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.292500376701355},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.23159927129745483},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21497231721878052},{"id":"https://openalex.org/keywords/jitter","display_name":"Jitter","score":0.2008085548877716},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19311141967773438},{"id":"https://openalex.org/keywords/voltage","display_name":"Voltage","score":0.15581214427947998},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15533733367919922}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.7842517495155334},{"id":"https://openalex.org/C12707504","wikidata":"https://www.wikidata.org/wiki/Q52637","display_name":"Phase-locked loop","level":3,"score":0.695428729057312},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6658851504325867},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.631868302822113},{"id":"https://openalex.org/C193523891","wikidata":"https://www.wikidata.org/wiki/Q1771950","display_name":"dBc","level":3,"score":0.529448926448822},{"id":"https://openalex.org/C89631360","wikidata":"https://www.wikidata.org/wiki/Q1428766","display_name":"Phase noise","level":2,"score":0.48371627926826477},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4385156035423279},{"id":"https://openalex.org/C20254490","wikidata":"https://www.wikidata.org/wiki/Q719550","display_name":"Biasing","level":3,"score":0.4271446764469147},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3676965832710266},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.292500376701355},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.23159927129745483},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21497231721878052},{"id":"https://openalex.org/C134652429","wikidata":"https://www.wikidata.org/wiki/Q1052698","display_name":"Jitter","level":2,"score":0.2008085548877716},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19311141967773438},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.15581214427947998},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15533733367919922}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/latw.2017.7906739","is_oa":false,"landing_page_url":"https://doi.org/10.1109/latw.2017.7906739","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 18th IEEE Latin American Test Symposium (LATS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W205666918","https://openalex.org/W1140034091","https://openalex.org/W1504981149","https://openalex.org/W1565539145","https://openalex.org/W1566916904","https://openalex.org/W1569638374","https://openalex.org/W1572865146","https://openalex.org/W1678512194","https://openalex.org/W1818737851","https://openalex.org/W1925457904","https://openalex.org/W2001859357","https://openalex.org/W2006961223","https://openalex.org/W2034525900","https://openalex.org/W2063615695","https://openalex.org/W2099101940","https://openalex.org/W2137864013","https://openalex.org/W2140904634","https://openalex.org/W2144737022","https://openalex.org/W2156152281","https://openalex.org/W2215169176","https://openalex.org/W2215369445","https://openalex.org/W2273057326","https://openalex.org/W2305886330","https://openalex.org/W2378876119","https://openalex.org/W2414666315","https://openalex.org/W2461822264","https://openalex.org/W2462372306","https://openalex.org/W2463586380","https://openalex.org/W2480783451","https://openalex.org/W2511761056","https://openalex.org/W2625396024","https://openalex.org/W2910225835","https://openalex.org/W2919857456","https://openalex.org/W3151421161","https://openalex.org/W6608343574","https://openalex.org/W6633762270","https://openalex.org/W6688600899","https://openalex.org/W6709855731"],"related_works":["https://openalex.org/W1560641296","https://openalex.org/W2581907565","https://openalex.org/W1509956468","https://openalex.org/W4210550727","https://openalex.org/W2316779977","https://openalex.org/W1851259350","https://openalex.org/W2355960652","https://openalex.org/W2738113613","https://openalex.org/W2245072401","https://openalex.org/W2041008635"],"abstract_inverted_index":{"A":[0],"methodology":[1],"to":[2,84],"secure":[3],"analog":[4],"intellectual":[5],"property":[6],"(IP)":[7],"by":[8],"obfuscating":[9],"biasing":[10],"conditions":[11],"is":[12,76,103],"presented":[13,58],"in":[14,59,78,119,125,133],"this":[15,60],"paper.":[16],"Previous":[17],"research":[18],"methodologies":[19],"have":[20],"focused":[21],"on":[22,64],"protecting":[23],"digital":[24,52],"IP":[25,34],"from":[26],"theft,":[27],"overproduction,":[28],"counterfeiting,":[29],"and":[30,48,128],"Trojan":[31],"insertion.":[32],"Analog":[33],"has":[35],"not":[36,42],"been":[37],"investigated":[38],"as":[39],"it":[40],"does":[41],"share":[43],"the":[44,74,79,96,113],"same":[45],"replicated":[46],"structures":[47],"functionalities":[49],"used":[50],"for":[51],"protection.":[53],"The":[54,70,92,109],"bias":[55],"encryption":[56,90],"techniques":[57],"paper":[61],"are":[62],"implemented":[63],"a":[65,88,116,122,129],"phase":[66,134],"locked":[67],"loop":[68],"(PLL).":[69],"operating":[71],"frequency":[72],"of":[73,81,94,111],"PLL":[75,114],"masked":[77],"range":[80],"800":[82],"MHz":[83],"2.2":[85],"GHz":[86],"with":[87],"40-bit":[89],"key.":[91],"probability":[93],"determining":[95],"correct":[97],"key":[98],"through":[99],"brute":[100],"force":[101],"attack":[102],"9.095\u00d710":[104],"<sup":[105],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[106],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">-13</sup>":[107],".":[108],"overheads":[110],"encrypting":[112],"include":[115],"6.3%":[117],"increase":[118,124,132],"active":[120],"area,":[121],"0.89%":[123],"power":[126],"consumption,":[127],"5":[130],"dBc/Hz":[131],"noise.":[135]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
