{"id":"https://openalex.org/W1995695043","doi":"https://doi.org/10.1109/socc.2012.6398363","title":"Intellectual property protection and security of SoCs &amp;#x2014; An embedded tutorial","display_name":"Intellectual property protection and security of SoCs &amp;#x2014; An embedded tutorial","publication_year":2012,"publication_date":"2012-09-01","ids":{"openalex":"https://openalex.org/W1995695043","doi":"https://doi.org/10.1109/socc.2012.6398363","mag":"1995695043"},"language":"en","primary_location":{"id":"doi:10.1109/socc.2012.6398363","is_oa":false,"landing_page_url":"https://doi.org/10.1109/socc.2012.6398363","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International SOC Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021904459","display_name":"Susmita Sur\u2010Kolay","orcid":"https://orcid.org/0000-0002-2052-3779"},"institutions":[{"id":"https://openalex.org/I6498739","display_name":"Indian Statistical Institute","ror":"https://ror.org/00q2w1j53","country_code":"IN","type":"education","lineage":["https://openalex.org/I6498739"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Susmita Sur-Kolay","raw_affiliation_strings":["Indian Statistical Institute, India","Indian Statistical institute, Kolkata#TAB#"],"affiliations":[{"raw_affiliation_string":"Indian Statistical Institute, India","institution_ids":["https://openalex.org/I6498739"]},{"raw_affiliation_string":"Indian Statistical institute, Kolkata#TAB#","institution_ids":["https://openalex.org/I6498739"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5021904459"],"corresponding_institution_ids":["https://openalex.org/I6498739"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07307476,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"289","last_page":"289"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9495999813079834,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/misappropriation","display_name":"Misappropriation","score":0.8755020499229431},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6747874021530151},{"id":"https://openalex.org/keywords/intellectual-property","display_name":"Intellectual property","score":0.6472416520118713},{"id":"https://openalex.org/keywords/very-large-scale-integration","display_name":"Very-large-scale integration","score":0.6364932060241699},{"id":"https://openalex.org/keywords/design-flow","display_name":"Design flow","score":0.6054232120513916},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5685701966285706},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5530906915664673},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.5127197504043579},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4728962182998657},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44882258772850037},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.41575825214385986},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18575656414031982},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11948034167289734}],"concepts":[{"id":"https://openalex.org/C2780858551","wikidata":"https://www.wikidata.org/wiki/Q3824105","display_name":"Misappropriation","level":2,"score":0.8755020499229431},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6747874021530151},{"id":"https://openalex.org/C34974158","wikidata":"https://www.wikidata.org/wiki/Q131257","display_name":"Intellectual property","level":2,"score":0.6472416520118713},{"id":"https://openalex.org/C14580979","wikidata":"https://www.wikidata.org/wiki/Q876049","display_name":"Very-large-scale integration","level":2,"score":0.6364932060241699},{"id":"https://openalex.org/C37135326","wikidata":"https://www.wikidata.org/wiki/Q931942","display_name":"Design flow","level":2,"score":0.6054232120513916},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5685701966285706},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5530906915664673},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.5127197504043579},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4728962182998657},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44882258772850037},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.41575825214385986},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18575656414031982},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11948034167289734},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/socc.2012.6398363","is_oa":false,"landing_page_url":"https://doi.org/10.1109/socc.2012.6398363","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International SOC Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Responsible consumption and production","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/12"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4385450162","https://openalex.org/W2380846236","https://openalex.org/W2359265788","https://openalex.org/W2367530550","https://openalex.org/W2376711248","https://openalex.org/W2959643697","https://openalex.org/W2418611605","https://openalex.org/W1976458997","https://openalex.org/W4253627223","https://openalex.org/W3088996813"],"abstract_inverted_index":{"VLSI":[0,28,73,80],"designs":[1,244],"and":[2,39,106,131,156,176,183,207,210,220,223,245,263],"hardware":[3,32],"cores":[4],"are":[5,129,196],"reused":[6],"in":[7,45,60,71,84,101,143,148,173,187,260,269],"order":[8],"to":[9,103,140,159,179,242],"meet":[10],"the":[11,17,46,50,55,72,87,126,160,170,177,181,188,238,257],"design":[12,29,47,74,127,213],"specifications":[13],"on":[14,256],"time,":[15],"considering":[16],"numerous":[18],"constraints":[19],"imposed":[20],"by":[21,119,202],"nanometer":[22],"technology.":[23],"Electronic":[24],"description":[25],"of":[26,57,78,86,94,145,162,194,228],"a":[27,31,61,79,112,271],"or":[30,49,53],"core":[33],"is":[34,151],"an":[35,152,275],"intellectual":[36,68],"property":[37,69],"(IP),":[38],"may":[40],"be":[41,232,251],"infringed":[42],"upon":[43],"either":[44],"house,":[48],"fabrication":[51,85],"facility,":[52],"at":[54,125,168],"time":[56],"its":[58,104],"reuse":[59,136],"system.":[62],"This":[63,164],"mandates":[64],"incorporating":[65],"techniques":[66],"for":[67,135,225,247,274],"protection":[70,122],"flow.":[75],"The":[76,192],"IP":[77,121,174,264],"design,":[81],"which":[82,115,266],"culminates":[83],"integrated":[88],"circuit,":[89],"differs":[90],"from":[91,237],"other":[92],"sources":[93],"IPs":[95,124],"such":[96,217],"as":[97,199,218],"image,":[98],"text,":[99],"because":[100],"addition":[102],"physical":[105],"structural":[107],"description,":[108],"it":[109,254],"also":[110],"has":[111,157],"behavioral":[113,239],"specification":[114],"should":[116],"remain":[117],"unaltered":[118],"any":[120],"technique.":[123],"level":[128],"editable":[130],"hence":[132],"more":[133,138],"flexible":[134],"yet":[137],"vulnerable":[139],"misappropriation.":[141],"Security":[142],"activation":[144],"chips,":[146],"especially":[147],"embedded":[149,165],"systems,":[150],"equally":[153],"grave":[154],"issue":[155],"led":[158],"paradigm":[161],"design-for-security.":[163],"tutorial":[166],"aims":[167],"presenting":[169],"major":[171],"concerns":[172],"security":[175],"challenges":[178],"implement":[180],"countermeasures":[182],"retain":[184],"their":[185],"effectiveness":[186],"entire":[189],"life":[190],"cycle.":[191],"nature":[193],"threats":[195],"broadly":[197],"categorized":[198],"(i)":[200,230],"misappropriation":[201,227],"hacking":[203],"during":[204],"electronic":[205],"commerce":[206,265],"intentional":[208],"reselling,":[209],"(ii)":[211],"unauthorized":[212],"retrieval.":[214],"Various":[215],"mechanisms":[216],"encryption":[219],"obfuscation,":[221],"watermarking":[222],"fingerprinting":[224],"countering":[226],"category":[229,248],"will":[231,250],"addressed.":[233],"Analytic":[234],"methods":[235],"derived":[236],"aspect":[240],"specific":[241],"chip":[243],"effective":[246],"(ii),":[249],"discussed.":[252],"Finally,":[253],"focuses":[255],"practical":[258],"issues":[259],"semiconductor":[261],"technology":[262],"pose":[267],"difficulty":[268],"ensuring":[270],"safe":[272],"cycle":[273],"IP.":[276]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
