{"id":"https://openalex.org/W2500678391","doi":"https://doi.org/10.1145/2948618.2948619","title":"Using Scan Side Channel for Detecting IP Theft","display_name":"Using Scan Side Channel for Detecting IP Theft","publication_year":2016,"publication_date":"2016-06-18","ids":{"openalex":"https://openalex.org/W2500678391","doi":"https://doi.org/10.1145/2948618.2948619","mag":"2500678391"},"language":"en","primary_location":{"id":"doi:10.1145/2948618.2948619","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2948618.2948619","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Hardware and Architectural Support for Security and Privacy 2016","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055334358","display_name":"Leonid Azriel","orcid":"https://orcid.org/0000-0003-1603-1365"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Leonid Azriel","raw_affiliation_strings":["Technion - Israel Institute of Technology, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Technion - Israel Institute of Technology, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010407295","display_name":"Ran Ginosar","orcid":null},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Ran Ginosar","raw_affiliation_strings":["Technion - Israel Institute of Technology, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Technion - Israel Institute of Technology, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061975828","display_name":"Shay Gueron","orcid":"https://orcid.org/0000-0002-9145-7609"},"institutions":[{"id":"https://openalex.org/I91203450","display_name":"University of Haifa","ror":"https://ror.org/02f009v59","country_code":"IL","type":"education","lineage":["https://openalex.org/I91203450"]},{"id":"https://openalex.org/I4210104622","display_name":"Intel (Israel)","ror":"https://ror.org/027t2s119","country_code":"IL","type":"company","lineage":["https://openalex.org/I1343180700","https://openalex.org/I4210104622"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Shay Gueron","raw_affiliation_strings":["University of Haifa, Israel and Intel Corporation, Intel Development Center, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"University of Haifa, Israel and Intel Corporation, Intel Development Center, Haifa, Israel","institution_ids":["https://openalex.org/I4210104622","https://openalex.org/I91203450"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089135250","display_name":"Avi Mendelson","orcid":"https://orcid.org/0000-0003-4274-6866"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Avi Mendelson","raw_affiliation_strings":["Technion - Israel Institute of Technology, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Technion - Israel Institute of Technology, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5055334358"],"corresponding_institution_ids":["https://openalex.org/I174306211"],"apc_list":null,"apc_paid":null,"fwci":0.6307,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67039684,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7962701916694641},{"id":"https://openalex.org/keywords/combinational-logic","display_name":"Combinational logic","score":0.707167387008667},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.6710904836654663},{"id":"https://openalex.org/keywords/sequential-logic","display_name":"Sequential logic","score":0.5753093361854553},{"id":"https://openalex.org/keywords/dependency-graph","display_name":"Dependency graph","score":0.5276362299919128},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.4673222601413727},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.46523112058639526},{"id":"https://openalex.org/keywords/scan-chain","display_name":"Scan chain","score":0.45007941126823425},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4493834376335144},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4468560516834259},{"id":"https://openalex.org/keywords/boolean-function","display_name":"Boolean function","score":0.43889158964157104},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3735305368900299},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.3692542314529419},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3683182895183563},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3392166495323181},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.29518014192581177},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.17464014887809753},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14520815014839172},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.1339111626148224}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7962701916694641},{"id":"https://openalex.org/C81409106","wikidata":"https://www.wikidata.org/wiki/Q76505","display_name":"Combinational logic","level":3,"score":0.707167387008667},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.6710904836654663},{"id":"https://openalex.org/C187075797","wikidata":"https://www.wikidata.org/wiki/Q173245","display_name":"Sequential logic","level":3,"score":0.5753093361854553},{"id":"https://openalex.org/C16311509","wikidata":"https://www.wikidata.org/wiki/Q4148050","display_name":"Dependency graph","level":3,"score":0.5276362299919128},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.4673222601413727},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.46523112058639526},{"id":"https://openalex.org/C150012182","wikidata":"https://www.wikidata.org/wiki/Q225990","display_name":"Scan chain","level":3,"score":0.45007941126823425},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4493834376335144},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4468560516834259},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.43889158964157104},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3735305368900299},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.3692542314529419},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3683182895183563},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3392166495323181},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.29518014192581177},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.17464014887809753},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14520815014839172},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.1339111626148224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2948618.2948619","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2948618.2948619","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Hardware and Architectural Support for Security and Privacy 2016","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1517585663","https://openalex.org/W1580838017","https://openalex.org/W1587602953","https://openalex.org/W1811921100","https://openalex.org/W1891181203","https://openalex.org/W1965439936","https://openalex.org/W1987339131","https://openalex.org/W2006834720","https://openalex.org/W2010903499","https://openalex.org/W2029979276","https://openalex.org/W2070402310","https://openalex.org/W2075187070","https://openalex.org/W2089923519","https://openalex.org/W2114336390","https://openalex.org/W2119147593","https://openalex.org/W2122111125","https://openalex.org/W2123825121","https://openalex.org/W2130839375","https://openalex.org/W2141715577","https://openalex.org/W2144980381","https://openalex.org/W2155450755","https://openalex.org/W2164152592","https://openalex.org/W2293877751","https://openalex.org/W2295021037","https://openalex.org/W3102754027","https://openalex.org/W6678291648"],"related_works":["https://openalex.org/W2130364905","https://openalex.org/W2752479413","https://openalex.org/W4386374027","https://openalex.org/W2787358728","https://openalex.org/W1548096828","https://openalex.org/W2151102355","https://openalex.org/W29481652","https://openalex.org/W4248668797","https://openalex.org/W2131499522","https://openalex.org/W2110968362"],"abstract_inverted_index":{"We":[0,178],"present":[1],"a":[2,102,187],"process":[3],"for":[4,82],"detection":[5],"of":[6,32,64,76,89,106,124,146,153,182,190,210,218],"IP":[7,20,90,157,174],"theft":[8,91],"in":[9,25,52],"VLSI":[10],"devices":[11],"that":[12,138,172],"exploits":[13],"the":[14,26,33,36,49,53,61,65,87,99,107,116,140,147,151,161,180,183,203,208,211,215,219,224],"internal":[15,50,66,108],"test":[16,188],"scan":[17,43],"chains.":[18],"The":[19,42,110,156],"owner":[21,158],"learns":[22],"implementation":[23,149,167],"details":[24],"suspect":[27],"device":[28],"to":[29,48,59,150,168],"find":[30],"evidence":[31],"theft,":[34],"while":[35],"top":[37],"level":[38,152],"function":[39,79,96,148],"is":[40,112],"public.":[41],"chains":[44],"supply":[45],"direct":[46],"access":[47],"registers":[51],"device,":[54],"thus":[55],"making":[56],"it":[57],"possible":[58],"learn":[60,223],"logic":[62,68,126],"functions":[63],"combinational":[67,125],"chunks.":[69],"Our":[70],"work":[71],"introduces":[72],"an":[73,173,191],"innovative":[74],"way":[75],"applying":[77],"Boolean":[78,95],"analysis":[80],"techniques":[81],"learning":[83,97],"digital":[84],"circuits":[85],"with":[86,134,164,186],"goal":[88],"detection.":[92],"By":[93],"using":[94,115],"methods,":[98],"learner":[100],"creates":[101],"partial":[103],"dependency":[104],"graph":[105,111,118],"flip-flops.":[109],"further":[113],"partitioned":[114],"SNN":[117],"clustering":[119],"method,":[120],"and":[121,222],"individual":[122],"blocks":[123,130,137],"are":[127],"isolated.":[128],"These":[129],"can":[131,159],"be":[132],"matched":[133],"known":[135],"building":[136],"compose":[139],"original":[141],"function.":[142],"This":[143],"enables":[144],"reconstruction":[145],"pipeline":[154],"structure.":[155],"compare":[160],"resulting":[162],"structure":[163],"his":[165],"own":[166],"confirm":[169],"or":[170],"refute":[171],"violation":[175],"has":[176],"occurred.":[177],"demonstrate":[179],"power":[181],"presented":[184,204],"approach":[185],"case":[189],"open":[192],"source":[193],"Bitcoin":[194],"SHA-256":[195,220],"accelerator,":[196],"containing":[197],"more":[198],"than":[199],"80,000":[200],"registers.":[201],"With":[202],"method":[205],"we":[206],"discover":[207],"microarchitecture":[209],"module,":[212],"locate":[213],"all":[214],"main":[216],"components":[217],"algorithm,":[221],"module's":[225],"flow":[226],"control.":[227]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
