{"id":"https://openalex.org/W2317421096","doi":"https://doi.org/10.1145/2858930.2858934","title":"Mode-based Obfuscation using Control-Flow Modifications","display_name":"Mode-based Obfuscation using Control-Flow Modifications","publication_year":2016,"publication_date":"2016-01-20","ids":{"openalex":"https://openalex.org/W2317421096","doi":"https://doi.org/10.1145/2858930.2858934","mag":"2317421096"},"language":"en","primary_location":{"id":"doi:10.1145/2858930.2858934","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2858930.2858934","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2858934&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=2858934&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002971586","display_name":"Sandhya Koteshwara","orcid":"https://orcid.org/0000-0003-3182-219X"},"institutions":[{"id":"https://openalex.org/I130238516","display_name":"University of Minnesota","ror":"https://ror.org/017zqws13","country_code":"US","type":"education","lineage":["https://openalex.org/I130238516"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sandhya Koteshwara","raw_affiliation_strings":["University of Minnesota, Twin Cities, 200 Union Street SE, Minneapolis, MN 55455, USA"],"affiliations":[{"raw_affiliation_string":"University of Minnesota, Twin Cities, 200 Union Street SE, Minneapolis, MN 55455, USA","institution_ids":["https://openalex.org/I130238516"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043025421","display_name":"Chris H. Kim","orcid":"https://orcid.org/0000-0002-4194-1347"},"institutions":[{"id":"https://openalex.org/I130238516","display_name":"University of Minnesota","ror":"https://ror.org/017zqws13","country_code":"US","type":"education","lineage":["https://openalex.org/I130238516"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chris H. Kim","raw_affiliation_strings":["University of Minnesota, Twin Cities, 200 Union Street SE, Minneapolis, MN 55455, USA"],"affiliations":[{"raw_affiliation_string":"University of Minnesota, Twin Cities, 200 Union Street SE, Minneapolis, MN 55455, USA","institution_ids":["https://openalex.org/I130238516"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007884053","display_name":"Keshab K. Parhi","orcid":"https://orcid.org/0000-0001-6543-2793"},"institutions":[{"id":"https://openalex.org/I130238516","display_name":"University of Minnesota","ror":"https://ror.org/017zqws13","country_code":"US","type":"education","lineage":["https://openalex.org/I130238516"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Keshab K. Parhi","raw_affiliation_strings":["University of Minnesota, Twin Cities, 200 Union Street SE, Minneapolis, MN 55455, USA"],"affiliations":[{"raw_affiliation_string":"University of Minnesota, Twin Cities, 200 Union Street SE, Minneapolis, MN 55455, USA","institution_ids":["https://openalex.org/I130238516"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5002971586"],"corresponding_institution_ids":["https://openalex.org/I130238516"],"apc_list":null,"apc_paid":null,"fwci":1.2799,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.77707992,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9556999802589417,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7442325353622437},{"id":"https://openalex.org/keywords/digital-signal-processing","display_name":"Digital signal processing","score":0.7151415944099426},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6680822372436523},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6450471878051758},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6393321752548218},{"id":"https://openalex.org/keywords/design-flow","display_name":"Design flow","score":0.5266437530517578},{"id":"https://openalex.org/keywords/fast-fourier-transform","display_name":"Fast Fourier transform","score":0.49717095494270325},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4818957448005676},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.427718847990036},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4219774603843689},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3415771424770355},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.33795166015625},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3231833875179291},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11459127068519592}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7442325353622437},{"id":"https://openalex.org/C84462506","wikidata":"https://www.wikidata.org/wiki/Q173142","display_name":"Digital signal processing","level":2,"score":0.7151415944099426},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6680822372436523},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6450471878051758},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6393321752548218},{"id":"https://openalex.org/C37135326","wikidata":"https://www.wikidata.org/wiki/Q931942","display_name":"Design flow","level":2,"score":0.5266437530517578},{"id":"https://openalex.org/C75172450","wikidata":"https://www.wikidata.org/wiki/Q623950","display_name":"Fast Fourier transform","level":2,"score":0.49717095494270325},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4818957448005676},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.427718847990036},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4219774603843689},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3415771424770355},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.33795166015625},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3231833875179291},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11459127068519592},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2858930.2858934","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2858930.2858934","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2858934&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/2858930.2858934","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2858930.2858934","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2858934&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4477637446","display_name":null,"funder_award_id":"CNS-1441639","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7546595959","display_name":null,"funder_award_id":"2014-TS-2560","funder_id":"https://openalex.org/F4320306087","funder_display_name":"Semiconductor Research Corporation"},{"id":"https://openalex.org/G8853048551","display_name":"SaTC: STARSS: Design of Secure and Anti-Counterfeit Integrated Circuits","funder_award_id":"1441639","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306087","display_name":"Semiconductor Research Corporation","ror":"https://ror.org/047z4n946"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2317421096.pdf","grobid_xml":"https://content.openalex.org/works/W2317421096.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W1501488688","https://openalex.org/W1533519936","https://openalex.org/W2012725064","https://openalex.org/W2049904515","https://openalex.org/W2067276029","https://openalex.org/W2067937469","https://openalex.org/W2097780146","https://openalex.org/W2103196322","https://openalex.org/W2115394282","https://openalex.org/W2122867301","https://openalex.org/W2135211381","https://openalex.org/W4247267706","https://openalex.org/W6631840971","https://openalex.org/W6677360588"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W2132360941","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W2152144666","https://openalex.org/W1819617256","https://openalex.org/W2904257204","https://openalex.org/W3088996813"],"abstract_inverted_index":{"Hardware":[0],"security":[1,36,153],"has":[2],"emerged":[3],"as":[4,33,74],"an":[5,75,120,172],"important":[6],"topic":[7],"in":[8,97,165],"the":[9,69,89,105,116,126,133,136,152,161],"wake":[10],"of":[11,31,49,55,79,101,154,175,181],"increasing":[12],"threats":[13],"on":[14,84,145],"integrated":[15],"circuits":[16,32,45],"which":[17,46,131],"include":[18],"reverse":[19],"engineering,":[20],"intellectual":[21],"property":[22],"(IP)":[23],"piracy":[24],"and":[25,38,58,142,150,168,177],"overbuilding.":[26],"This":[27],"paper":[28],"explores":[29],"obfuscation":[30],"a":[34,80,85,146,166,178],"hardware":[35],"measure":[37],"specifically":[39],"targets":[40],"digital":[41],"signal":[42],"processing":[43],"(DSP)":[44],"are":[47,113],"part":[48],"most":[50],"modern":[51],"systems.":[52],"The":[53,77,91,122],"idea":[54],"using":[56,68],"desired":[57,99,137],"undesired":[59,111],"modes":[60,112],"to":[61,88,95,118,124],"design":[62,117,127,170],"obfuscated":[63],"DSP":[64],"functions":[65],"is":[66,82,93,108,158],"illustrated":[67],"fast":[70],"Fourier":[71],"transform":[72],"(FFT)":[73],"example.":[76],"selection":[78],"mode":[81,100],"dependent":[83],"key":[86,107],"input":[87],"circuit.":[90],"system":[92],"said":[94],"work":[96],"its":[98],"operation":[102],"only":[103],"if":[104],"correct":[106],"applied.":[109],"Other":[110],"built":[114],"into":[115],"confuse":[119],"adversary.":[121],"approach":[123,163],"obfuscating":[125],"involves":[128],"control-flow":[129],"modifications":[130],"alter":[132],"computations":[134],"from":[135],"mode.":[138],"We":[139],"present":[140],"simulation":[141],"synthesis":[143],"results":[144,164],"reconfigurable,":[147],"2-parallel":[148],"FFT":[149],"discuss":[151],"this":[155],"approach.":[156],"It":[157],"shown":[159],"that":[160],"proposed":[162],"reconfigurable":[167],"flexible":[169],"at":[171],"area":[173],"overhead":[174,180],"8%":[176],"power":[179],"10%.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":3}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
