{"id":"https://openalex.org/W4400878446","doi":"https://doi.org/10.1109/tifs.2024.3431991","title":"Thwarting GNN-Based Attacks Against Logic Locking","display_name":"Thwarting GNN-Based Attacks Against Logic Locking","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4400878446","doi":"https://doi.org/10.1109/tifs.2024.3431991"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3431991","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3431991","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062494695","display_name":"Armin Darjani","orcid":"https://orcid.org/0000-0002-9174-8158"},"institutions":[{"id":"https://openalex.org/I78650965","display_name":"TU Dresden","ror":"https://ror.org/042aqky30","country_code":"DE","type":"education","lineage":["https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Armin Darjani","raw_affiliation_strings":["Department of Computer Science, Technische Universit&#x00E4;t Dresden, Dresden, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Technische Universit&#x00E4;t Dresden, Dresden, Germany","institution_ids":["https://openalex.org/I78650965"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082979317","display_name":"Nima Kavand","orcid":"https://orcid.org/0000-0002-4588-5303"},"institutions":[{"id":"https://openalex.org/I78650965","display_name":"TU Dresden","ror":"https://ror.org/042aqky30","country_code":"DE","type":"education","lineage":["https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Nima Kavand","raw_affiliation_strings":["Department of Computer Science, Technische Universit&#x00E4;t Dresden, Dresden, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Technische Universit&#x00E4;t Dresden, Dresden, Germany","institution_ids":["https://openalex.org/I78650965"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075349265","display_name":"Shubham Rai","orcid":"https://orcid.org/0000-0002-6522-5628"},"institutions":[{"id":"https://openalex.org/I889804353","display_name":"Robert Bosch (Germany)","ror":"https://ror.org/01fe0jt45","country_code":"DE","type":"company","lineage":["https://openalex.org/I889804353"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Shubham Rai","raw_affiliation_strings":["Robert Bosch GmbH, Corporate Research, Renningen, Germany"],"affiliations":[{"raw_affiliation_string":"Robert Bosch GmbH, Corporate Research, Renningen, Germany","institution_ids":["https://openalex.org/I889804353"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100755285","display_name":"Akash Kumar","orcid":"https://orcid.org/0000-0001-7125-1737"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Akash Kumar","raw_affiliation_strings":["Faculty of Electrical Engineering and Information Technology, Ruhr University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering and Information Technology, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5062494695"],"corresponding_institution_ids":["https://openalex.org/I78650965"],"apc_list":null,"apc_paid":null,"fwci":3.6386,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.94267841,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"19","issue":null,"first_page":"7200","last_page":"7215"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10558","display_name":"Advancements in Semiconductor Devices and Circuit Design","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8170533180236816},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42831093072891235}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8170533180236816},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42831093072891235}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3431991","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3431991","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1504027613","https://openalex.org/W1524250393","https://openalex.org/W2015698216","https://openalex.org/W2067276029","https://openalex.org/W2343475170","https://openalex.org/W2788919350","https://openalex.org/W2795373693","https://openalex.org/W2892708618","https://openalex.org/W2945557633","https://openalex.org/W2951156228","https://openalex.org/W2985665839","https://openalex.org/W2999189851","https://openalex.org/W3008907581","https://openalex.org/W3092142741","https://openalex.org/W3092370864","https://openalex.org/W3108642877","https://openalex.org/W3117152020","https://openalex.org/W3129056223","https://openalex.org/W3140586337","https://openalex.org/W3157690307","https://openalex.org/W3162915675","https://openalex.org/W3176152958","https://openalex.org/W3176852059","https://openalex.org/W3183146245","https://openalex.org/W3186662332","https://openalex.org/W3200855694","https://openalex.org/W3212416488","https://openalex.org/W4280640024","https://openalex.org/W4281670546","https://openalex.org/W4281917088","https://openalex.org/W4283735953","https://openalex.org/W4311080747","https://openalex.org/W4312286139","https://openalex.org/W4386763948","https://openalex.org/W6783171965"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"The":[0],"globalization":[1],"of":[2,35,60,67,77,100,147,153,213,230,276],"the":[3,31,36,69,74,92,95,119,123,138,145,154,166,181,209,214,228],"IC":[4],"manufacturing":[5],"flow":[6],"has":[7,63,84],"exposed":[8],"intellectual":[9],"property":[10],"(IP)":[11],"to":[12,29,90,150,161,179,195],"many":[13],"untrustworthy":[14],"entities.":[15],"As":[16],"a":[17,23,41,57,86,196],"result,":[18],"security":[19,272],"should":[20],"be":[21,180],"considered":[22],"new":[24],"paradigm":[25],"in":[26],"designing":[27],"circuits":[28,49,121,128,232],"protect":[30,48],"integrity":[32],"and":[33,53,72,98,157,164,247,266,269,273],"confidentiality":[34],"IP.":[37],"Logic":[38],"locking":[39,79,155,167,216,253],"is":[40],"holistic":[42],"design-for-trust":[43],"(DFT)":[44],"technique":[45,89],"that":[46,117,185],"can":[47,187],"against":[50,233],"IP":[51],"piracy":[52],"reverse":[54,162],"engineering.":[55],"However,":[56],"large":[58],"body":[59],"recent":[61],"research":[62],"demonstrated":[64],"successful":[65],"methods":[66],"recovering":[68],"secret":[70],"key":[71],"restoring":[73],"original":[75],"functionality":[76],"existing":[78],"systems.":[80],"Although":[81],"SAT":[82],"attack":[83,102],"been":[85,104],"de":[87],"facto":[88],"break":[91,118],"logic":[93,215,252],"locking,":[94],"threat":[96],"model":[97],"efficiency":[99],"this":[101,159,200],"have":[103,112],"questioned":[105],"recently.":[106],"To":[107],"overcome":[108],"these":[109,224],"shortcomings,":[110],"researchers":[111],"proposed":[113,278],"powerful":[114],"structural":[115,131,211],"attacks":[116,136,141,176],"locked":[120],"without":[122],"need":[124],"for":[125],"functionally":[126],"unlocked":[127],"(Oracle).":[129],"Among":[130,169],"attacks,":[132],"machine":[133],"learning":[134,256],"(ML)-based":[135],"are":[137,177],"most":[139,182],"potent":[140],"as":[142,189],"they":[143,190],"harness":[144],"power":[146],"neural":[148,174],"networks":[149],"learn":[151],"traces":[152],"structures":[156,193],"use":[158],"knowledge":[160],"back":[163],"neutralize":[165],"scheme.":[168],"ML":[170],"approaches,":[171],"GNN":[172],"(graph":[173],"networks)-based":[175],"shown":[178],"capable":[183],"tools":[184],"attackers":[186],"employ":[188],"exploit":[191],"graph":[192],"inherent":[194,210],"circuit\u2019s":[197],"netlist.":[198],"In":[199],"paper,":[201],"<xref":[202,218,236],"ref-type=\"disp-formula\"":[203,219,237],"rid=\"deqn1-deqn2\"":[204,220],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[205,221,239],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(1)</xref>":[206],"We":[207,241,259],"discuss":[208],"weaknesses":[212],"techniques.":[217],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(2)</xref>":[222],"Knowing":[223],"weaknesses,":[225],"we":[226],"investigate":[227],"challenges":[229],"protecting":[231],"GNN-based":[234],"attacks.":[235],"rid=\"deqn3\"":[238],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(3)</xref>":[240],"propose":[242],"GNN-resilient":[243,248],"Interconnect-based":[244],"obfuscation":[245],"(GRIN)":[246],"Gate-based":[249],"Obfuscation":[250],"(GREGO)":[251],"schemes":[254,263],"with":[255],"resilient":[257],"structures.":[258],"evaluate":[260],"our":[261,277],"secure":[262],"using":[264],"ISCAS-85":[265],"ITC-99":[267],"benchmarks":[268],"provide":[270],"comprehensive":[271],"overhead":[274],"analysis":[275],"schemes.":[279]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
