{"id":"https://openalex.org/W2511422681","doi":"https://doi.org/10.1109/tifs.2016.2601067","title":"Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques","display_name":"Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques","publication_year":2016,"publication_date":"2016-08-17","ids":{"openalex":"https://openalex.org/W2511422681","doi":"https://doi.org/10.1109/tifs.2016.2601067","mag":"2511422681"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2016.2601067","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2601067","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1910.00981","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Arunkumar Vijayakumar","orcid":"https://orcid.org/0000-0002-8843-9004"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Arunkumar Vijayakumar","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Vinay C. Patil","orcid":"https://orcid.org/0000-0001-9076-2727"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vinay C. Patil","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Daniel E. Holcomb","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniel E. Holcomb","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Christof Paar","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]},{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE","US"],"is_corresponding":false,"raw_author_name":"Christof Paar","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, MA, USA","Horst G\u00f6rtz Institute for IT-Security, Ruhr-Universit\u00e4t Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security, Ruhr-Universit\u00e4t Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":null,"display_name":"Sandip Kundu","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sandip Kundu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I24603500"],"apc_list":null,"apc_paid":null,"fwci":12.1591,"has_fulltext":false,"cited_by_count":109,"citation_normalized_percentile":{"value":0.99107956,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"12","issue":"1","first_page":"64","last_page":"77"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0017999999690800905,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.0006000000284984708,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8780999779701233},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.6341000199317932},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.47369998693466187},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.4584999978542328},{"id":"https://openalex.org/keywords/physical-design","display_name":"Physical design","score":0.45840001106262207},{"id":"https://openalex.org/keywords/engineering-design-process","display_name":"Engineering design process","score":0.42820000648498535},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.42489999532699585},{"id":"https://openalex.org/keywords/very-large-scale-integration","display_name":"Very-large-scale integration","score":0.4174000024795532},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.41019999980926514}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8780999779701233},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.819100022315979},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.6341000199317932},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.47369998693466187},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.4584999978542328},{"id":"https://openalex.org/C188817802","wikidata":"https://www.wikidata.org/wiki/Q13426855","display_name":"Physical design","level":3,"score":0.45840001106262207},{"id":"https://openalex.org/C34972735","wikidata":"https://www.wikidata.org/wiki/Q2920267","display_name":"Engineering design process","level":2,"score":0.42820000648498535},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.42489999532699585},{"id":"https://openalex.org/C14580979","wikidata":"https://www.wikidata.org/wiki/Q876049","display_name":"Very-large-scale integration","level":2,"score":0.4174000024795532},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.41019999980926514},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.40149998664855957},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.3418999910354614},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.34060001373291016},{"id":"https://openalex.org/C74524168","wikidata":"https://www.wikidata.org/wiki/Q1074539","display_name":"Integrated circuit design","level":2,"score":0.3393000066280365},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33880001306533813},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.335999995470047},{"id":"https://openalex.org/C2778464652","wikidata":"https://www.wikidata.org/wiki/Q309849","display_name":"Open research","level":2,"score":0.3215000033378601},{"id":"https://openalex.org/C128582244","wikidata":"https://www.wikidata.org/wiki/Q939007","display_name":"Physical computing","level":2,"score":0.31060001254081726},{"id":"https://openalex.org/C48262172","wikidata":"https://www.wikidata.org/wiki/Q16908765","display_name":"Design process","level":3,"score":0.30709999799728394},{"id":"https://openalex.org/C157922185","wikidata":"https://www.wikidata.org/wiki/Q173198","display_name":"Logic synthesis","level":3,"score":0.29809999465942383},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.29170000553131104},{"id":"https://openalex.org/C190560348","wikidata":"https://www.wikidata.org/wiki/Q3245116","display_name":"Circuit design","level":2,"score":0.2912999987602234},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2831999957561493},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.2777999937534332},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.27570000290870667},{"id":"https://openalex.org/C138852830","wikidata":"https://www.wikidata.org/wiki/Q2292993","display_name":"Design methods","level":2,"score":0.2750999927520752},{"id":"https://openalex.org/C64260653","wikidata":"https://www.wikidata.org/wiki/Q1194864","display_name":"Electronic design automation","level":2,"score":0.260699987411499},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.25780001282691956},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2556000053882599},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2547999918460846},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.25429999828338623}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2016.2601067","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2601067","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1910.00981","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1910.00981","pdf_url":"https://arxiv.org/pdf/1910.00981","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1910.00981","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1910.00981","pdf_url":"https://arxiv.org/pdf/1910.00981","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G272141794","display_name":null,"funder_award_id":"1421352","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G728572616","display_name":null,"funder_award_id":"1563829","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W71050201","https://openalex.org/W76123274","https://openalex.org/W196942907","https://openalex.org/W1524250393","https://openalex.org/W1578962173","https://openalex.org/W1732617650","https://openalex.org/W1904766697","https://openalex.org/W1966937064","https://openalex.org/W1984265486","https://openalex.org/W1989793850","https://openalex.org/W1996003557","https://openalex.org/W2007424711","https://openalex.org/W2012725064","https://openalex.org/W2026531723","https://openalex.org/W2050241597","https://openalex.org/W2052353102","https://openalex.org/W2063615695","https://openalex.org/W2065181350","https://openalex.org/W2067276029","https://openalex.org/W2088517221","https://openalex.org/W2089361329","https://openalex.org/W2095410905","https://openalex.org/W2097980344","https://openalex.org/W2099101940","https://openalex.org/W2103292881","https://openalex.org/W2112965713","https://openalex.org/W2114717587","https://openalex.org/W2119749816","https://openalex.org/W2119983229","https://openalex.org/W2122122437","https://openalex.org/W2128943990","https://openalex.org/W2134734244","https://openalex.org/W2135211381","https://openalex.org/W2138834041","https://openalex.org/W2140904634","https://openalex.org/W2143470815","https://openalex.org/W2152402305","https://openalex.org/W2155199871","https://openalex.org/W2161998562","https://openalex.org/W2166778460","https://openalex.org/W2347054447","https://openalex.org/W2544422621","https://openalex.org/W3144121041","https://openalex.org/W4231363479","https://openalex.org/W4236524207","https://openalex.org/W4253548266","https://openalex.org/W6631782372","https://openalex.org/W6634033044","https://openalex.org/W6675797392","https://openalex.org/W6680861166"],"related_works":[],"abstract_inverted_index":{"The":[0,50],"threat":[1],"of":[2,14,37,52,80,85,109,136,178,208,214],"hardware":[3,24,123],"reverse":[4,21],"engineering":[5,22],"is":[6,23,150,167],"a":[7,11,70,105,120,134,151,170,176],"growing":[8],"concern":[9],"for":[10,45,122,157,169,198,230],"large":[12,152],"number":[13],"applications.":[15],"A":[16],"main":[17],"defense":[18],"strategy":[19],"against":[20],"obfuscation.":[25,200],"In":[26,94],"this":[27,95,100],"paper,":[28,96],"we":[29,97,132,174,189,205,218],"investigate":[30],"physical":[31,139],"obfuscation":[32,140],"techniques,":[33],"which":[34,72],"perform":[35],"alterations":[36],"circuit":[38,121],"elements":[39,160],"that":[40,181],"are":[41,56],"difficult":[42],"or":[43,62,185],"impossible":[44],"an":[46],"adversary":[47],"to":[48,76,103,114,118,145,222],"observe.":[49],"examples":[51],"such":[53],"stealthy":[54],"manipulations":[55],"changes":[57],"in":[58,91,186],"the":[59,77,81,92,110,137,164,179,209],"doping":[60],"concentrations":[61],"dielectric":[63],"manipulations.":[64],"An":[65],"attacker":[66],"will,":[67],"thus,":[68],"extract":[69],"netlist,":[71],"does":[73],"not":[74],"correspond":[75],"logic":[78],"function":[79],"device-under-attack.":[82],"This":[83,125],"approach":[84,210],"camouflaging":[86],"has":[87],"garnered":[88],"recent":[89,191],"attention":[90],"literature.":[93],"expound":[98],"on":[99],"promising":[101],"direction":[102],"conduct":[104],"systematic":[106,171],"end-to-end":[107],"study":[108],"VLSI":[111],"design":[112,147,155,199],"process":[113],"find":[115],"multiple":[116],"ways":[117],"obfuscate":[119],"security.":[124],"paper":[126],"makes":[127],"three":[128],"major":[129],"contributions.":[130],"First,":[131],"provide":[133,175],"categorization":[135],"available":[138],"techniques":[141,197],"as":[142],"it":[143],"pertains":[144],"various":[146],"stages.":[148],"There":[149],"and":[153,161,163,192,195,211,226],"multidimensional":[154],"space":[156],"introducing":[158],"obfuscated":[159],"mechanisms,":[162],"proposed":[165,184],"taxonomy":[166],"helpful":[168],"treatment.":[172],"Second,":[173],"review":[177],"methods":[180],"have":[182],"been":[183],"use.":[187],"Third,":[188],"present":[190],"new":[193],"device":[194],"logic-level":[196],"For":[201],"each":[202],"technique":[203],"considered,":[204],"discuss":[206],"feasibility":[207],"assess":[212],"likelihood":[213],"its":[215],"detection.":[216],"Then":[217],"turn":[219],"our":[220],"focus":[221],"open":[223],"research":[224,232],"questions,":[225],"conclude":[227],"with":[228],"suggestions":[229],"future":[231],"directions.":[233]},"counts_by_year":[{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":11},{"year":2017,"cited_by_count":15}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2016-09-16T00:00:00"}
