{"id":"https://openalex.org/W4386883103","doi":"https://doi.org/10.1109/tvlsi.2023.3296279","title":"Hidden Costs of Analog Deobfuscation Attacks","display_name":"Hidden Costs of Analog Deobfuscation Attacks","publication_year":2023,"publication_date":"2023-09-20","ids":{"openalex":"https://openalex.org/W4386883103","doi":"https://doi.org/10.1109/tvlsi.2023.3296279"},"language":"en","primary_location":{"id":"doi:10.1109/tvlsi.2023.3296279","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvlsi.2023.3296279","pdf_url":null,"source":{"id":"https://openalex.org/S37538908","display_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","issn_l":"1063-8210","issn":["1063-8210","1557-9999"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022476194","display_name":"Vaibhav Venugopal Rao","orcid":"https://orcid.org/0000-0002-9369-1730"},"institutions":[{"id":"https://openalex.org/I72816309","display_name":"Drexel University","ror":"https://ror.org/04bdffz58","country_code":"US","type":"education","lineage":["https://openalex.org/I72816309"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vaibhav Venugopal Rao","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Drexel University, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Drexel University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I72816309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086590030","display_name":"Kyle Juretus","orcid":"https://orcid.org/0000-0001-6588-4167"},"institutions":[{"id":"https://openalex.org/I7863295","display_name":"Villanova University","ror":"https://ror.org/02g7kd627","country_code":"US","type":"education","lineage":["https://openalex.org/I7863295"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kyle Juretus","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Villanova University, Villanova, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Villanova University, Villanova, PA, USA","institution_ids":["https://openalex.org/I7863295"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059641297","display_name":"Ioannis Savidis","orcid":"https://orcid.org/0000-0003-4230-1795"},"institutions":[{"id":"https://openalex.org/I72816309","display_name":"Drexel University","ror":"https://ror.org/04bdffz58","country_code":"US","type":"education","lineage":["https://openalex.org/I72816309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ioannis Savidis","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Drexel University, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Drexel University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I72816309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022476194"],"corresponding_institution_ids":["https://openalex.org/I72816309"],"apc_list":null,"apc_paid":null,"fwci":1.2302,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.77842337,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":"31","issue":"11","first_page":"1802","last_page":"1815"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.63248211145401},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6068825721740723},{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.5562573671340942},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5477088093757629},{"id":"https://openalex.org/keywords/satisfiability-modulo-theories","display_name":"Satisfiability modulo theories","score":0.5374387502670288},{"id":"https://openalex.org/keywords/analogue-electronics","display_name":"Analogue electronics","score":0.4780193567276001},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4507184624671936},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.4097977876663208},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.35680487751960754},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.28678077459335327},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.27424943447113037},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.25024139881134033},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2375693917274475},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1347358524799347},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.09377959370613098}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.63248211145401},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6068825721740723},{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.5562573671340942},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5477088093757629},{"id":"https://openalex.org/C164155591","wikidata":"https://www.wikidata.org/wiki/Q2067766","display_name":"Satisfiability modulo theories","level":2,"score":0.5374387502670288},{"id":"https://openalex.org/C29074008","wikidata":"https://www.wikidata.org/wiki/Q174925","display_name":"Analogue electronics","level":3,"score":0.4780193567276001},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4507184624671936},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.4097977876663208},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35680487751960754},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.28678077459335327},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.27424943447113037},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.25024139881134033},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2375693917274475},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1347358524799347},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.09377959370613098}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tvlsi.2023.3296279","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvlsi.2023.3296279","pdf_url":null,"source":{"id":"https://openalex.org/S37538908","display_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","issn_l":"1063-8210","issn":["1063-8210","1557-9999"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G8654201786","display_name":null,"funder_award_id":"CNS-1751032","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1782800369","https://openalex.org/W1973175885","https://openalex.org/W2020312095","https://openalex.org/W2074582507","https://openalex.org/W2103408915","https://openalex.org/W2336864643","https://openalex.org/W2343475170","https://openalex.org/W2378876119","https://openalex.org/W2465737901","https://openalex.org/W2609004879","https://openalex.org/W2738836551","https://openalex.org/W2766393343","https://openalex.org/W2771999643","https://openalex.org/W2782164439","https://openalex.org/W2900105238","https://openalex.org/W2910838140","https://openalex.org/W2931751079","https://openalex.org/W2943129030","https://openalex.org/W2945852412","https://openalex.org/W3006959628","https://openalex.org/W3091534268","https://openalex.org/W3118075076","https://openalex.org/W3209142679","https://openalex.org/W4206638329","https://openalex.org/W4229448373","https://openalex.org/W4318580662","https://openalex.org/W4392268481"],"related_works":["https://openalex.org/W2170314243","https://openalex.org/W2119179026","https://openalex.org/W2794947590","https://openalex.org/W2114971758","https://openalex.org/W2109932036","https://openalex.org/W4287023151","https://openalex.org/W3202607186","https://openalex.org/W3193821359","https://openalex.org/W2124342848","https://openalex.org/W2171786655"],"abstract_inverted_index":{"Analog":[0],"obfuscation":[1],"techniques":[2,97],"to":[3,15,36,80,270],"prevent":[4],"intellectual":[5],"property":[6],"attacks":[7],"have":[8],"mainly":[9],"evolved":[10],"from":[11],"digital":[12,16],"obfuscation.":[13],"Similar":[14],"hardware":[17],"security,":[18],"the":[19,26,29,58,71,77,90,112,128,134,141,177,213,226,265,272,279],"considered":[20],"threat":[21],"models":[22],"commonly":[23],"assume":[24],"that":[25],"attacker":[27],"possesses":[28],"circuit":[30,85],"netlist,":[31],"specifications,":[32],"and":[33,73,180,216,274],"bias":[34],"information":[35,49,78,106,131],"deobfuscate":[37],"a":[38,151,160,257],"locked":[39],"analog":[40,62,84,95,117,194,260],"circuit.":[41,234,261],"However,":[42],"when":[43,100,149],"one":[44,101],"or":[45,102],"more":[46,103],"pieces":[47,104],"of":[48,60,70,75,92,105,111,130,264,277],"remain":[50],"unavailable,":[51],"there":[52],"is":[53,86,98,107,124,167,203,241],"an":[54,68,83,231,252],"adverse":[55],"effect":[56],"on":[57,114,154],"performance":[59,91],"current":[61,93],"attack":[63,82,96,113,138,153,166,179,202,215,229,240,254],"algorithms.":[64],"In":[65,88],"this":[66],"article,":[67],"analysis":[69,110,263],"challenges":[72],"limitations":[74],"obtaining":[76],"needed":[79],"successfully":[81],"provided.":[87],"addition,":[89],"state-of-the-art":[94],"evaluated":[99],"unavailable.":[108],"The":[109,136,163,196],"five":[115],"distinct":[116],"circuits":[118,157],"obfuscated":[119,158,233],"with":[120,159],"key-based":[121],"parameter":[122],"locking":[123],"performed,":[125],"premised":[126],"upon":[127],"level":[129],"possessed":[132],"by":[133],"adversary.":[135],"monotonic":[137,178,214,253],"(MA)":[139],"returned":[140],"correct":[142],"key":[143,227],"in":[144],"less":[145],"than":[146,176,212,225,251],"10":[147],"h":[148],"executing":[150,278],"black-box":[152],"single":[155,258],"stage":[156,259],"10-bit":[161],"key.":[162],"key-spacing":[164],"(KS)":[165],"<inline-formula":[168,182,204,217,243],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[169,183,205,218,244],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[170,184,206,219,245],"<tex-math":[171,185,207,220,246],"notation=\"LaTeX\">$10\\times":[172],"$":[173,187,209,222,248],"</tex-math></inline-formula>":[174,188,210,223,249],"faster":[175],"returns":[181],"notation=\"LaTeX\">$8.3\\times":[186],"fewer":[189],"candidate":[190],"keys":[191],"for":[192,230,256],"multistage":[193],"circuits.":[195],"satisfiability":[197],"modulo":[198],"theory":[199],"(SMT)":[200],"based":[201,239],"notation=\"LaTeX\">$224\\times":[208],"slower":[211,224,250],"notation=\"LaTeX\">$2240\\times":[221],"spacing":[228],"18-bit":[232],"A":[235],"genetic":[236],"algorithm":[237],"(GA)":[238],"121":[242],"notation=\"LaTeX\">$091\\times":[247],"even":[255],"Through":[262],"results,":[266],"metrics":[267],"are":[268],"developed":[269],"characterize":[271],"setup":[273],"evaluation":[275],"time":[276],"deobfuscation":[280],"attacks.":[281]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
