{"id":"https://openalex.org/W2747980214","doi":"https://doi.org/10.1109/tetc.2017.2740364","title":"Removal Attacks on Logic Locking and Camouflaging Techniques","display_name":"Removal Attacks on Logic Locking and Camouflaging Techniques","publication_year":2017,"publication_date":"2017-08-21","ids":{"openalex":"https://openalex.org/W2747980214","doi":"https://doi.org/10.1109/tetc.2017.2740364","mag":"2747980214"},"language":"en","primary_location":{"id":"doi:10.1109/tetc.2017.2740364","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2017.2740364","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034926702","display_name":"Muhammad Yasin","orcid":"https://orcid.org/0000-0001-9475-2796"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Muhammad Yasin","raw_affiliation_strings":["Electrical and Computer Engineering, Tandon School of Engineering, New York University, Brooklyn"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, Tandon School of Engineering, New York University, Brooklyn","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087458084","display_name":"Bodhisatwa Mazumdar","orcid":"https://orcid.org/0000-0003-1883-4639"},"institutions":[{"id":"https://openalex.org/I64295750","display_name":"Indian Institute of Technology Indore","ror":"https://ror.org/01hhf7w52","country_code":"IN","type":"education","lineage":["https://openalex.org/I64295750"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bodhisatwa Mazumdar","raw_affiliation_strings":["Computer Science and Engineering, Indian Institute of Technology Indore, Indore, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Indian Institute of Technology Indore, Indore, India","institution_ids":["https://openalex.org/I64295750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059987567","display_name":"Ozgur Sinanoglu","orcid":"https://orcid.org/0000-0003-0782-0397"},"institutions":[{"id":"https://openalex.org/I120250893","display_name":"New York University Abu Dhabi","ror":"https://ror.org/00e5k0821","country_code":"AE","type":"education","lineage":["https://openalex.org/I120250893","https://openalex.org/I57206974"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ozgur Sinanoglu","raw_affiliation_strings":["New York University in Abu Dhabi, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"New York University in Abu Dhabi, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I120250893"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059126377","display_name":"Jeyavijayan Rajendran","orcid":"https://orcid.org/0000-0003-3687-3746"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jeyavijayan Rajendran","raw_affiliation_strings":["Department of Electrical Engineering, University of Texas at Dallas, Richardson"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of Texas at Dallas, Richardson","institution_ids":["https://openalex.org/I162577319"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5034926702"],"corresponding_institution_ids":["https://openalex.org/I57206974"],"apc_list":null,"apc_paid":null,"fwci":24.3216,"has_fulltext":false,"cited_by_count":250,"citation_normalized_percentile":{"value":0.99826228,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"8","issue":"2","first_page":"517","last_page":"532"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9602000117301941,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7618954181671143},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.7390904426574707},{"id":"https://openalex.org/keywords/skew","display_name":"Skew","score":0.5359635353088379},{"id":"https://openalex.org/keywords/boolean-satisfiability-problem","display_name":"Boolean satisfiability problem","score":0.5169786214828491},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4649706184864044},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.42115211486816406},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39012500643730164},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3525421619415283},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08222118020057678}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7618954181671143},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.7390904426574707},{"id":"https://openalex.org/C43711488","wikidata":"https://www.wikidata.org/wiki/Q7534783","display_name":"Skew","level":2,"score":0.5359635353088379},{"id":"https://openalex.org/C6943359","wikidata":"https://www.wikidata.org/wiki/Q875276","display_name":"Boolean satisfiability problem","level":2,"score":0.5169786214828491},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4649706184864044},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.42115211486816406},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39012500643730164},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3525421619415283},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08222118020057678}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tetc.2017.2740364","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2017.2740364","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3826675100","display_name":null,"funder_award_id":"65513-CS","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7793436342","display_name":null,"funder_award_id":"1652842","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W76123274","https://openalex.org/W1482046022","https://openalex.org/W1515903565","https://openalex.org/W1524250393","https://openalex.org/W1904766697","https://openalex.org/W1953436618","https://openalex.org/W1966666955","https://openalex.org/W2008819052","https://openalex.org/W2050241597","https://openalex.org/W2052353102","https://openalex.org/W2059408092","https://openalex.org/W2063615695","https://openalex.org/W2064541558","https://openalex.org/W2067276029","https://openalex.org/W2070402310","https://openalex.org/W2095410905","https://openalex.org/W2112173236","https://openalex.org/W2112965713","https://openalex.org/W2124954128","https://openalex.org/W2135211381","https://openalex.org/W2140904634","https://openalex.org/W2152406824","https://openalex.org/W2157661732","https://openalex.org/W2160444875","https://openalex.org/W2285261652","https://openalex.org/W2343475170","https://openalex.org/W2346502084","https://openalex.org/W2419784917","https://openalex.org/W2499445168","https://openalex.org/W2511422681","https://openalex.org/W2532898432","https://openalex.org/W2536656707","https://openalex.org/W2560525892","https://openalex.org/W2579874865","https://openalex.org/W2587958472","https://openalex.org/W2708742051","https://openalex.org/W2963360895","https://openalex.org/W3098521738","https://openalex.org/W6730646790","https://openalex.org/W6733632429"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W3210347767","https://openalex.org/W25973253","https://openalex.org/W3102737270","https://openalex.org/W3029194710","https://openalex.org/W2792957989","https://openalex.org/W1584401868","https://openalex.org/W2953382042","https://openalex.org/W4301374518","https://openalex.org/W2584195379"],"abstract_inverted_index":{"With":[0],"the":[1,64,106],"adoption":[2],"of":[3,90],"a":[4,87],"globalized":[5],"and":[6,15,28,45,75,93,124,134],"distributed":[7],"IC":[8,29],"design":[9],"flow,":[10],"IP":[11],"piracy,":[12],"reverse":[13],"engineering,":[14],"counterfeiting":[16],"threats":[17],"are":[18],"becoming":[19],"more":[20],"prevalent.":[21],"Logic":[22],"obfuscation":[23],"techniques":[24,47],"including":[25],"logic":[26,43],"locking":[27,44],"camouflaging":[30,46],"have":[31,79],"been":[32,80],"developed":[33],"to":[34,49,104],"address":[35],"these":[36,91],"emergent":[37],"challenges.":[38],"A":[39],"major":[40],"challenge":[41],"for":[42],"is":[48],"resist":[50],"Boolean":[51],"satisfiability":[52],"(SAT)":[53],"based":[54],"attacks":[55],"that":[56,95,130],"can":[57,131],"circumvent":[58],"state-of-the-art":[59],"solutions":[60,71],"within":[61,136],"minutes.":[62,137],"Over":[63],"past":[65],"year,":[66],"multiple":[67],"SAT":[68,107],"attack":[69],"resilient":[70],"such":[72],"as":[73],"Anti-SAT":[74,133],"AND-tree":[76],"insertion":[77],"(ATI)":[78],"presented.":[81],"In":[82],"this":[83],"paper,":[84],"we":[85],"perform":[86],"security":[88],"analysis":[89],"countermeasures":[92],"show":[94],"they":[96],"leave":[97],"structural":[98],"traces":[99],"behind":[100],"in":[101],"their":[102],"attempts":[103],"thwart":[105],"attack.":[108],"We":[109],"present":[110],"three":[111],"attacks,":[112],"namely":[113],"\u201csignal":[114],"probability":[115],"skew\u201d":[116],"(SPS)":[117],"attack,":[118,123],"\u201cAppSAT":[119],"guided":[120,126],"removal":[121],"(AGR)":[122],"\u201csensitization":[125],"SAT\u201d":[127],"(SGS)":[128],"attack\u201d,":[129],"break":[132],"ATI,":[135]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":21},{"year":2024,"cited_by_count":26},{"year":2023,"cited_by_count":25},{"year":2022,"cited_by_count":29},{"year":2021,"cited_by_count":39},{"year":2020,"cited_by_count":45},{"year":2019,"cited_by_count":42},{"year":2018,"cited_by_count":15},{"year":2017,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
