{"id":"https://openalex.org/W2810685556","doi":"https://doi.org/10.1109/tifs.2018.2850319","title":"On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes","display_name":"On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes","publication_year":2018,"publication_date":"2018-06-25","ids":{"openalex":"https://openalex.org/W2810685556","doi":"https://doi.org/10.1109/tifs.2018.2850319","mag":"2810685556"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2018.2850319","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2850319","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://stars.library.ucf.edu/scopus2015/9631","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049217675","display_name":"Kaveh Shamsi","orcid":"https://orcid.org/0000-0002-9952-4597"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kaveh Shamsi","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020816244","display_name":"Travis Meade","orcid":"https://orcid.org/0009-0000-1001-4789"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Travis Meade","raw_affiliation_strings":["Department of Computer Science, University of Central Florida, Orlando, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Central Florida, Orlando, FL, USA","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100457502","display_name":"Meng Li","orcid":"https://orcid.org/0000-0002-7212-2264"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Meng Li","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011883763","display_name":"David Z. Pan","orcid":"https://orcid.org/0000-0002-5705-2501"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Z. Pan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017464942","display_name":"Yier Jin","orcid":"https://orcid.org/0000-0002-8791-0597"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yier Jin","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5049217675"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":10.2652,"has_fulltext":false,"cited_by_count":70,"citation_normalized_percentile":{"value":0.9872197,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"14","issue":"2","first_page":"347","last_page":"359"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7562336325645447},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.5073034167289734},{"id":"https://openalex.org/keywords/logic-synthesis","display_name":"Logic synthesis","score":0.41375842690467834},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.33292073011398315},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.31193631887435913}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7562336325645447},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.5073034167289734},{"id":"https://openalex.org/C157922185","wikidata":"https://www.wikidata.org/wiki/Q173198","display_name":"Logic synthesis","level":3,"score":0.41375842690467834},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.33292073011398315},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.31193631887435913}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2018.2850319","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2850319","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:stars.library.ucf.edu:scopus2015-10630","is_oa":true,"landing_page_url":"https://stars.library.ucf.edu/scopus2015/9631","pdf_url":null,"source":{"id":"https://openalex.org/S4210172555","display_name":"Journal of International Crisis and Risk Communication Research","issn_l":"2576-0017","issn":["2576-0017","2576-0025"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Export 2015-2019","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:stars.library.ucf.edu:scopus2015-10630","is_oa":true,"landing_page_url":"https://stars.library.ucf.edu/scopus2015/9631","pdf_url":null,"source":{"id":"https://openalex.org/S4210172555","display_name":"Journal of International Crisis and Risk Communication Research","issn_l":"2576-0017","issn":["2576-0017","2576-0025"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Export 2015-2019","raw_type":"text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6000000238418579}],"awards":[{"id":"https://openalex.org/G5451293400","display_name":null,"funder_award_id":"FA8650-18-1-7822","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"}],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W924455922","https://openalex.org/W1513363711","https://openalex.org/W1513874326","https://openalex.org/W1524250393","https://openalex.org/W1894646615","https://openalex.org/W1987179059","https://openalex.org/W1994669980","https://openalex.org/W2008819052","https://openalex.org/W2012725064","https://openalex.org/W2045313701","https://openalex.org/W2052353102","https://openalex.org/W2063615695","https://openalex.org/W2067276029","https://openalex.org/W2074131327","https://openalex.org/W2075795621","https://openalex.org/W2083314129","https://openalex.org/W2085026045","https://openalex.org/W2092545762","https://openalex.org/W2112965713","https://openalex.org/W2123594341","https://openalex.org/W2124954128","https://openalex.org/W2343475170","https://openalex.org/W2394517960","https://openalex.org/W2419784917","https://openalex.org/W2464661970","https://openalex.org/W2499445168","https://openalex.org/W2517890368","https://openalex.org/W2532898432","https://openalex.org/W2536656707","https://openalex.org/W2587958472","https://openalex.org/W2615010670","https://openalex.org/W2615060729","https://openalex.org/W2718023883","https://openalex.org/W2741234428","https://openalex.org/W2741711485","https://openalex.org/W2747980214","https://openalex.org/W2766393343","https://openalex.org/W2776226745","https://openalex.org/W2790282160","https://openalex.org/W2951325841","https://openalex.org/W4234937017","https://openalex.org/W4248383989","https://openalex.org/W6669490149","https://openalex.org/W6742228250","https://openalex.org/W6746609838"],"related_works":["https://openalex.org/W2098419840","https://openalex.org/W1966764473","https://openalex.org/W2789349722","https://openalex.org/W1985308002","https://openalex.org/W2056896932","https://openalex.org/W2614722573","https://openalex.org/W2121963733","https://openalex.org/W1977171228","https://openalex.org/W2059422871","https://openalex.org/W2041787842"],"abstract_inverted_index":{"The":[0],"SAT-based":[1,87],"attacks":[2,70,172,178],"are":[3,65,71],"extremely":[4],"successful":[5,66],"in":[6,145],"deobfuscating":[7],"the":[8,24,29,39,74,77,93,120,139,164],"traditional":[9],"combinational":[10],"logic":[11],"locking":[12],"and":[13,58,131,159],"IC":[14],"camouflaging":[15],"schemes.":[16],"While":[17],"several":[18],"SAT-resilient":[19,114,142],"protection":[20,78,143,151],"schemes":[21,53,64,144,152],"that":[22,153],"increase":[23,138],"minimum":[25,123],"query":[26,60,124,157],"count":[27,125,158],"of":[28,36,46,76,96,122,141,168],"attack":[30,88,98,106],"have":[31,154],"been":[32],"proposed":[33],"recently,":[34],"none":[35],"them":[37,47],"satisfy":[38],"output":[40],"corruptibility":[41,52,57,75,140],"(error)":[42],"criteria.":[43],"Therefore,":[44],"most":[45],"were":[48],"combined":[49],"with":[50],"high":[51,59,156],"to":[54,73,111,126,137,163],"achieve":[55],"both":[56,155],"count.":[61],"These":[62],"\u201ccompound\u201d":[63],"since":[67],"existing":[68],"SAT":[69],"agnostic":[72],"scheme.":[79,115],"In":[80,116],"this":[81],"paper,":[82],"we":[83,118,132],"propose":[84,133],"an":[85,97],"approximate":[86,171],"framework":[89],"which":[90],"focuses":[91],"on":[92],"iterative":[94],"convergence":[95],"toward":[99],"a":[100,108,112,127,134,146],"better":[101],"solution.":[102],"This":[103,149],"helps":[104],"our":[105],"reduce":[107],"compound":[109],"scheme":[110],"standalone":[113],"addition,":[117],"relate":[119],"problem":[121],"well-known":[128],"graph":[129],"problem,":[130],"novel":[135],"technique":[136],"controllable":[147],"manner.":[148],"creates":[150],"corruptibility.":[160],"Furthermore,":[161],"due":[162],"approximation":[165],"resiliency":[166],"property":[167],"these":[169],"schemes,":[170],"provide":[173],"no":[174],"advantage":[175],"over":[176],"exact":[177],"when":[179],"attacking":[180],"them.":[181]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
