{"id":"https://openalex.org/W4389076318","doi":"https://doi.org/10.1109/tcsii.2023.3335861","title":"Concealing Exposed Circuit Features Through a MaxSAT-Based Logic Locking Method","display_name":"Concealing Exposed Circuit Features Through a MaxSAT-Based Logic Locking Method","publication_year":2023,"publication_date":"2023-11-28","ids":{"openalex":"https://openalex.org/W4389076318","doi":"https://doi.org/10.1109/tcsii.2023.3335861"},"language":"en","primary_location":{"id":"doi:10.1109/tcsii.2023.3335861","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsii.2023.3335861","pdf_url":null,"source":{"id":"https://openalex.org/S93916849","display_name":"IEEE Transactions on Circuits & Systems II Express Briefs","issn_l":"1549-7747","issn":["1549-7747","1558-3791"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems II: Express Briefs","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093357680","display_name":"Mohammad Moradi Shahmiri","orcid":"https://orcid.org/0000-0001-6346-7589"},"institutions":[{"id":"https://openalex.org/I23946033","display_name":"University of Tehran","ror":"https://ror.org/05vf56z40","country_code":"IR","type":"education","lineage":["https://openalex.org/I23946033"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mohammad Moradi Shahmiri","raw_affiliation_strings":["Design, Verification and Debugging of Embedded Systems Laboratory, School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Design, Verification and Debugging of Embedded Systems Laboratory, School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, Iran","institution_ids":["https://openalex.org/I23946033"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069623023","display_name":"Bijan Alizadeh","orcid":"https://orcid.org/0000-0003-4436-4597"},"institutions":[{"id":"https://openalex.org/I23946033","display_name":"University of Tehran","ror":"https://ror.org/05vf56z40","country_code":"IR","type":"education","lineage":["https://openalex.org/I23946033"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Bijan Alizadeh","raw_affiliation_strings":["Design, Verification and Debugging of Embedded Systems Laboratory, School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Design, Verification and Debugging of Embedded Systems Laboratory, School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, Iran","institution_ids":["https://openalex.org/I23946033"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5093357680"],"corresponding_institution_ids":["https://openalex.org/I23946033"],"apc_list":null,"apc_paid":null,"fwci":0.3076,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53423367,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"71","issue":"4","first_page":"2039","last_page":"2043"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7133610248565674},{"id":"https://openalex.org/keywords/multiplexer","display_name":"Multiplexer","score":0.6746523380279541},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6690667271614075},{"id":"https://openalex.org/keywords/lock","display_name":"Lock (firearm)","score":0.5575963854789734},{"id":"https://openalex.org/keywords/satisfiability","display_name":"Satisfiability","score":0.5471134185791016},{"id":"https://openalex.org/keywords/boolean-satisfiability-problem","display_name":"Boolean satisfiability problem","score":0.48908931016921997},{"id":"https://openalex.org/keywords/maximum-satisfiability-problem","display_name":"Maximum satisfiability problem","score":0.42564719915390015},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4224134385585785},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3796595633029938},{"id":"https://openalex.org/keywords/boolean-function","display_name":"Boolean function","score":0.19112297892570496},{"id":"https://openalex.org/keywords/multiplexing","display_name":"Multiplexing","score":0.14584043622016907},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10775327682495117},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09655719995498657}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7133610248565674},{"id":"https://openalex.org/C70970002","wikidata":"https://www.wikidata.org/wiki/Q189434","display_name":"Multiplexer","level":3,"score":0.6746523380279541},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6690667271614075},{"id":"https://openalex.org/C174839445","wikidata":"https://www.wikidata.org/wiki/Q1134386","display_name":"Lock (firearm)","level":2,"score":0.5575963854789734},{"id":"https://openalex.org/C168773769","wikidata":"https://www.wikidata.org/wiki/Q1350299","display_name":"Satisfiability","level":2,"score":0.5471134185791016},{"id":"https://openalex.org/C6943359","wikidata":"https://www.wikidata.org/wiki/Q875276","display_name":"Boolean satisfiability problem","level":2,"score":0.48908931016921997},{"id":"https://openalex.org/C111797529","wikidata":"https://www.wikidata.org/wiki/Q17080584","display_name":"Maximum satisfiability problem","level":3,"score":0.42564719915390015},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4224134385585785},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3796595633029938},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.19112297892570496},{"id":"https://openalex.org/C19275194","wikidata":"https://www.wikidata.org/wiki/Q222903","display_name":"Multiplexing","level":2,"score":0.14584043622016907},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10775327682495117},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09655719995498657},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsii.2023.3335861","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsii.2023.3335861","pdf_url":null,"source":{"id":"https://openalex.org/S93916849","display_name":"IEEE Transactions on Circuits & Systems II Express Briefs","issn_l":"1549-7747","issn":["1549-7747","1558-3791"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems II: Express Briefs","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2124618076","https://openalex.org/W2126693329","https://openalex.org/W2152406824","https://openalex.org/W2892708618","https://openalex.org/W3035954314","https://openalex.org/W3082448945","https://openalex.org/W3108642877","https://openalex.org/W3117152020","https://openalex.org/W3129056223","https://openalex.org/W3162915675","https://openalex.org/W3176852059","https://openalex.org/W3183146245","https://openalex.org/W3186662332","https://openalex.org/W4206807714","https://openalex.org/W4280640024"],"related_works":["https://openalex.org/W2408080066","https://openalex.org/W2394616262","https://openalex.org/W192406999","https://openalex.org/W2406837904","https://openalex.org/W3152212242","https://openalex.org/W2014111643","https://openalex.org/W2102364390","https://openalex.org/W1913543287","https://openalex.org/W2336941104","https://openalex.org/W2571882453"],"abstract_inverted_index":{"Logic":[0],"locking":[1,37],"has":[2,20],"emerged":[3],"as":[4,59],"an":[5,101,146],"effective":[6],"means":[7],"of":[8,16,24,108,141],"hardware":[9],"intellectual":[10],"property":[11],"protection.":[12],"Nevertheless,":[13],"the":[14,22,85,88,92,106,114,121,125,129,139,152],"success":[15],"machine":[17],"learning-based":[18,47,115],"attacks":[19],"necessitated":[21],"development":[23],"new":[25],"countermeasures.":[26],"In":[27],"this":[28],"brief,":[29],"we":[30,55],"propose":[31],"a":[32,51,80],"novel":[33],"approach":[34],"to":[35,45,74,120],"multiplexer-based":[36],"that":[38,82],"conceals":[39],"structural":[40],"and":[41,91],"functional":[42],"features":[43,58,93],"common":[44],"all":[46],"attacks.":[48],"By":[49],"employing":[50],"constraint":[52],"programming":[53],"approach,":[54],"formulate":[56],"those":[57],"weights":[60],"for":[61,128],"Conjunctive":[62],"Normal":[63],"Form":[64],"(CNF)":[65],"clauses.":[66],"We":[67],"then":[68],"use":[69],"Maximum":[70],"Satisfiability":[71],"(MaxSAT)":[72],"solvers":[73],"choose":[75],"locked":[76],"net":[77],"pairs":[78],"in":[79,105,149],"manner":[81],"effectively":[83],"decreases":[84],"correlation":[86],"between":[87],"key":[89,111],"bits":[90,112,143],"exploited":[94],"by":[95,113,145],"attackers.":[96],"The":[97],"experimental":[98],"results":[99],"demonstrate":[100],"44.19%":[102],"average":[103,147],"reduction":[104],"number":[107,140],"correctly":[109],"predicted":[110],"MuxLink":[116],"attack":[117,133],"when":[118],"compared":[119],"DMUX":[122,153],"lock.":[123,154],"Furthermore,":[124],"prediction":[126],"accuracy":[127],"constant":[130],"propagation-based":[131],"SCOPE":[132],"was":[134],"consistently":[135],"below":[136],"50%,":[137],"while":[138],"undecided":[142],"rose":[144],"29.04%":[148],"comparison":[150],"with":[151]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
