{"id":"https://openalex.org/W2063615695","doi":"https://doi.org/10.1145/2508859.2516656","title":"Security analysis of integrated circuit camouflaging","display_name":"Security analysis of integrated circuit camouflaging","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W2063615695","doi":"https://doi.org/10.1145/2508859.2516656","mag":"2063615695"},"language":"en","primary_location":{"id":"doi:10.1145/2508859.2516656","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2508859.2516656","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 ACM SIGSAC conference on Computer &amp; communications security - CCS '13","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059126377","display_name":"Jeyavijayan Rajendran","orcid":"https://orcid.org/0000-0003-3687-3746"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]},{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jeyavijayan Rajendran","raw_affiliation_strings":["Polytechnic Institute of NYU, Brooklyn, NY, USA","Polytechnic institute of NYU, Brooklyn, NY, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Polytechnic Institute of NYU, Brooklyn, NY, USA","institution_ids":["https://openalex.org/I90965887"]},{"raw_affiliation_string":"Polytechnic institute of NYU, Brooklyn, NY, USA#TAB#","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109176316","display_name":"Michael Sam","orcid":null},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]},{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Sam","raw_affiliation_strings":["Polytechnic Institute of NYU, Brooklyn, NY, USA","Polytechnic institute of NYU, Brooklyn, NY, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Polytechnic Institute of NYU, Brooklyn, NY, USA","institution_ids":["https://openalex.org/I90965887"]},{"raw_affiliation_string":"Polytechnic institute of NYU, Brooklyn, NY, USA#TAB#","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059987567","display_name":"Ozgur Sinanoglu","orcid":"https://orcid.org/0000-0003-0782-0397"},"institutions":[{"id":"https://openalex.org/I120250893","display_name":"New York University Abu Dhabi","ror":"https://ror.org/00e5k0821","country_code":"AE","type":"education","lineage":["https://openalex.org/I120250893","https://openalex.org/I57206974"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ozgur Sinanoglu","raw_affiliation_strings":["New York University - Abu Dhabi, Abu Dhabi, Uae","New York University Abu Dhabi, Abu Dhabi, Uae#TAB#"],"affiliations":[{"raw_affiliation_string":"New York University - Abu Dhabi, Abu Dhabi, Uae","institution_ids":[]},{"raw_affiliation_string":"New York University Abu Dhabi, Abu Dhabi, Uae#TAB#","institution_ids":["https://openalex.org/I120250893"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059648257","display_name":"Ramesh Karri","orcid":"https://orcid.org/0000-0001-7989-5617"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]},{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ramesh Karri","raw_affiliation_strings":["Polytechnic Institute of NYU, Brooklyn, NY, USA","Polytechnic institute of NYU, Brooklyn, NY, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Polytechnic Institute of NYU, Brooklyn, NY, USA","institution_ids":["https://openalex.org/I90965887"]},{"raw_affiliation_string":"Polytechnic institute of NYU, Brooklyn, NY, USA#TAB#","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5059126377"],"corresponding_institution_ids":["https://openalex.org/I57206974","https://openalex.org/I90965887"],"apc_list":null,"apc_paid":null,"fwci":19.7305,"has_fulltext":false,"cited_by_count":376,"citation_normalized_percentile":{"value":0.99616992,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"709","last_page":"720"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9605000019073486,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.9423191547393799},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7486790418624878},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.7440979480743408},{"id":"https://openalex.org/keywords/camouflage","display_name":"Camouflage","score":0.6910563111305237},{"id":"https://openalex.org/keywords/microprocessor","display_name":"Microprocessor","score":0.5309637784957886},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5239070653915405},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5076404809951782},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.48549702763557434},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.45034804940223694},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4302137494087219},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.38256239891052246},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15164166688919067},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14590182900428772},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.12474420666694641},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07541951537132263}],"concepts":[{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.9423191547393799},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7486790418624878},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.7440979480743408},{"id":"https://openalex.org/C2776196576","wikidata":"https://www.wikidata.org/wiki/Q196113","display_name":"Camouflage","level":2,"score":0.6910563111305237},{"id":"https://openalex.org/C2780728072","wikidata":"https://www.wikidata.org/wiki/Q5297","display_name":"Microprocessor","level":2,"score":0.5309637784957886},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5239070653915405},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5076404809951782},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.48549702763557434},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.45034804940223694},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4302137494087219},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.38256239891052246},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15164166688919067},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14590182900428772},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.12474420666694641},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07541951537132263},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2508859.2516656","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2508859.2516656","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 ACM SIGSAC conference on Computer &amp; communications security - CCS '13","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W63082618","https://openalex.org/W102361951","https://openalex.org/W1505879652","https://openalex.org/W1515903565","https://openalex.org/W1565539145","https://openalex.org/W1595368737","https://openalex.org/W1767588723","https://openalex.org/W1901717559","https://openalex.org/W1970852936","https://openalex.org/W1986199670","https://openalex.org/W1999039453","https://openalex.org/W2006275946","https://openalex.org/W2012725064","https://openalex.org/W2029979276","https://openalex.org/W2045818632","https://openalex.org/W2064541558","https://openalex.org/W2067276029","https://openalex.org/W2106409910","https://openalex.org/W2112173236","https://openalex.org/W2116374153","https://openalex.org/W2124954128","https://openalex.org/W2135211381","https://openalex.org/W2140904634","https://openalex.org/W2141409546","https://openalex.org/W2151759197","https://openalex.org/W2167621131","https://openalex.org/W2167668681","https://openalex.org/W2202385382","https://openalex.org/W2405399329"],"related_works":["https://openalex.org/W2348329006","https://openalex.org/W2379031960","https://openalex.org/W2170314243","https://openalex.org/W2376458710","https://openalex.org/W2293426816","https://openalex.org/W2750884072","https://openalex.org/W3202403423","https://openalex.org/W3179822130","https://openalex.org/W2054606206","https://openalex.org/W4387917714"],"abstract_inverted_index":{"Camouflaging":[0],"is":[1],"a":[2,24,34,52],"layout-level":[3],"technique":[4,86],"that":[5,103],"hampers":[6],"an":[7,45,58],"attacker":[8,46],"from":[9],"reverse":[10,89],"engineering":[11],"by":[12,98],"introducing,":[13],"in":[14],"one":[15,31,41],"embodiment,":[16],"dummy":[17,29,82],"contacts":[18],"into":[19],"the":[20,49,66,70,81,104,107],"layout.":[21],"By":[22],"using":[23,99,129],"mix":[25],"of":[26,42,51,68,72,106],"real":[27],"and":[28,122,133],"contacts,":[30],"can":[32,39],"camouflage":[33,97],"standard":[35],"cell":[36],"whose":[37],"functionality":[38,50,71],"be":[40],"many.":[43],"If":[44],"cannot":[47],"resolve":[48],"camouflaged":[53,73],"gate,":[54],"he/she":[55],"will":[56],"extract":[57],"incorrect":[59],"netlist.":[60],"In":[61],"this":[62],"paper,":[63],"we":[64,92],"analyze":[65],"feasibility":[67],"identifying":[69],"gates.":[74],"We":[75],"also":[76],"propose":[77],"techniques":[78,100,114,126],"to":[79,88,96],"make":[80],"contact-based":[83],"IC":[84,116],"camouflaging":[85],"resilient":[87],"engineering.":[90],"Furthermore,":[91],"judiciously":[93],"select":[94],"gates":[95],"which":[101],"ensure":[102],"outputs":[105],"extracted":[108],"netlist":[109],"are":[110,127],"controllably":[111],"corrupted.":[112],"The":[113,124],"leverage":[115],"testing":[117],"principles":[118],"such":[119],"as":[120],"justification":[121],"sensitization.":[123],"proposed":[125],"evaluated":[128],"ISCAS":[130],"benchmark":[131],"circuits":[132],"OpenSparc":[134],"T1":[135],"microprocessor":[136],"controllers.":[137]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":22},{"year":2023,"cited_by_count":28},{"year":2022,"cited_by_count":25},{"year":2021,"cited_by_count":35},{"year":2020,"cited_by_count":41},{"year":2019,"cited_by_count":42},{"year":2018,"cited_by_count":48},{"year":2017,"cited_by_count":60},{"year":2016,"cited_by_count":33},{"year":2015,"cited_by_count":15},{"year":2014,"cited_by_count":12},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
