{"id":"https://openalex.org/W2534787757","doi":"https://doi.org/10.1145/2966986.2967053","title":"Making split-fabrication more secure","display_name":"Making split-fabrication more secure","publication_year":2016,"publication_date":"2016-10-18","ids":{"openalex":"https://openalex.org/W2534787757","doi":"https://doi.org/10.1145/2966986.2967053","mag":"2534787757"},"language":"en","primary_location":{"id":"doi:10.1145/2966986.2967053","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2966986.2967053","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2967053&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th International Conference on Computer-Aided Design","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=2967053&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063911057","display_name":"Ping-Lin Yang","orcid":"https://orcid.org/0000-0002-6723-8190"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]},{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ping-Lin Yang","raw_affiliation_strings":["University of California","University of California, Santa Barbara, 93106, USA"],"affiliations":[{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]},{"raw_affiliation_string":"University of California, Santa Barbara, 93106, USA","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063371595","display_name":"Malgorzata Marek-Sadowska","orcid":"https://orcid.org/0000-0002-3934-7031"},"institutions":[{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]},{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Malgorzata Marek-Sadowska","raw_affiliation_strings":["University of California","University of California, Santa Barbara, 93106, USA"],"affiliations":[{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]},{"raw_affiliation_string":"University of California, Santa Barbara, 93106, USA","institution_ids":["https://openalex.org/I154570441"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5063911057"],"corresponding_institution_ids":["https://openalex.org/I154570441","https://openalex.org/I2803209242"],"apc_list":null,"apc_paid":null,"fwci":3.1534,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.91762272,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9567000269889832,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5917460322380066},{"id":"https://openalex.org/keywords/foundry","display_name":"Foundry","score":0.5702677369117737},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5392739772796631},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.487913578748703},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.47063279151916504},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4695753753185272},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.43842968344688416},{"id":"https://openalex.org/keywords/design-flow","display_name":"Design flow","score":0.4320027828216553},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.41212227940559387},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3547884225845337},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.27190425992012024},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.267416775226593},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.18610838055610657},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.18518215417861938},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15839213132858276},{"id":"https://openalex.org/keywords/mechanical-engineering","display_name":"Mechanical engineering","score":0.11763444542884827}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5917460322380066},{"id":"https://openalex.org/C2781087836","wikidata":"https://www.wikidata.org/wiki/Q13883136","display_name":"Foundry","level":2,"score":0.5702677369117737},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5392739772796631},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.487913578748703},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.47063279151916504},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4695753753185272},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.43842968344688416},{"id":"https://openalex.org/C37135326","wikidata":"https://www.wikidata.org/wiki/Q931942","display_name":"Design flow","level":2,"score":0.4320027828216553},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.41212227940559387},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3547884225845337},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.27190425992012024},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.267416775226593},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.18610838055610657},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.18518215417861938},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15839213132858276},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.11763444542884827},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2966986.2967053","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2966986.2967053","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2967053&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th International Conference on Computer-Aided Design","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/2966986.2967053","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2966986.2967053","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2967053&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th International Conference on Computer-Aided Design","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2900916788","display_name":null,"funder_award_id":"CCF-1320401","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2534787757.pdf","grobid_xml":"https://content.openalex.org/works/W2534787757.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W924455922","https://openalex.org/W1524250393","https://openalex.org/W1589091388","https://openalex.org/W1616249851","https://openalex.org/W1966666955","https://openalex.org/W1976955200","https://openalex.org/W1982691824","https://openalex.org/W1990097965","https://openalex.org/W2008819052","https://openalex.org/W2012032225","https://openalex.org/W2015952501","https://openalex.org/W2016461982","https://openalex.org/W2043301750","https://openalex.org/W2046705287","https://openalex.org/W2055907668","https://openalex.org/W2061007021","https://openalex.org/W2065858973","https://openalex.org/W2067276029","https://openalex.org/W2070686838","https://openalex.org/W2092545762","https://openalex.org/W2093405763","https://openalex.org/W2095410905","https://openalex.org/W2105714044","https://openalex.org/W2106366482","https://openalex.org/W2112813001","https://openalex.org/W2117782804","https://openalex.org/W2150928734","https://openalex.org/W2160007566","https://openalex.org/W2168635756","https://openalex.org/W2221643708","https://openalex.org/W2289553614","https://openalex.org/W6636609968","https://openalex.org/W6661044858","https://openalex.org/W6683776559"],"related_works":["https://openalex.org/W2782017703","https://openalex.org/W2120912790","https://openalex.org/W4318003314","https://openalex.org/W2612718941","https://openalex.org/W4248805755","https://openalex.org/W1952517978","https://openalex.org/W2677867825","https://openalex.org/W3088996813","https://openalex.org/W2465780682","https://openalex.org/W3041781162"],"abstract_inverted_index":{"Today":[0],"many":[1],"design":[2,7,59,109,142,158],"houses":[3],"must":[4],"outsource":[5],"their":[6],"fabrication":[8],"to":[9,49,54,64,194],"a":[10,38,77,106],"third":[11],"party":[12],"which":[13,151,185],"is":[14,20,91,143,189,235],"often":[15],"an":[16,28,210,213],"overseas":[17],"foundry.":[18,40],"Split-fabrication":[19],"proposed":[21,206],"for":[22,111,191],"combining":[23],"the":[24,34,50,56,82,97,112,126,141,157,172,181,196,205,223,226,230],"FEOL":[25],"capabilities":[26,36],"of":[27,37,81,95,125,150,229],"advanced":[29],"but":[30],"untrusted":[31],"foundry":[32,193],"with":[33],"BEOL":[35],"trusted":[39],"Hardware":[41],"security":[42],"in":[43,62],"this":[44,102,192],"business":[45],"model":[46],"relates":[47],"directly":[48],"front-end":[51,182],"foundry's":[52],"ability":[53],"interpret":[55],"partial":[57],"circuit":[58],"it":[60,188],"receives":[61],"order":[63],"reverse":[65],"engineer":[66],"or":[67],"insert":[68],"malicious":[69],"circuits.":[70,121],"The":[71],"published":[72],"experimental":[73],"results":[74],"indicate":[75],"that":[76,187],"relatively":[78],"large":[79],"percentage":[80,228],"split":[83],"nets":[84,220,234],"can":[85,152],"be":[86,153],"correctly":[87,231],"guessed":[88],"and":[89,129,133,160,167,208],"there":[90],"no":[92],"easy":[93],"way":[94],"detecting":[96],"possibly":[98],"inserted":[99],"Trojans.":[100],"In":[101,138,171],"paper,":[103],"we":[104],"propose":[105,156],"secure":[107],"split-fabrication":[108],"methodology":[110],"Vertical":[113],"Slit":[114],"Field":[115],"Effect":[116],"Transistor":[117],"(VeSFET)":[118],"based":[119],"integrated":[120],"We":[122,155,198],"take":[123],"advantage":[124],"VeSFET's":[127],"unique":[128],"powerful":[130],"two-side":[131],"accessibility":[132],"monolithic":[134],"3D":[135,173],"integration":[136],"capability.":[137],"our":[139],"approach":[140],"manufactured":[144,221],"by":[145,212,222],"two":[146],"independent":[147],"foundries,":[148],"both":[149],"untrusted.":[154],"partition":[159],"piracy":[161],"prevention,":[162,166],"hardware":[163],"Trojan":[164,168],"insertion":[165],"detection":[169],"methods.":[170],"designs,":[174],"some":[175],"transistors":[176],"are":[177],"physically":[178],"hidden":[179],"from":[180],"foundry_1's":[183],"view,":[184],"causes":[186],"impossible":[190],"reconstruct":[195],"circuit.":[197],"designed":[199],"10":[200],"MCNC":[201],"benchmark":[202],"circuits":[203],"using":[204],"flow":[207],"executed":[209],"attack":[211],"in-house":[214],"developed":[215],"proximity":[216],"attacker.":[217],"With":[218],"5%":[219],"back-end":[224],"foundry_2,":[225],"average":[227],"reconstructed":[232],"partitioned":[233],"less":[236],"than":[237],"1%.":[238]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
