{"id":"https://openalex.org/W2766393343","doi":"https://doi.org/10.1145/3133956.3133985","title":"Provably-Secure Logic Locking","display_name":"Provably-Secure Logic Locking","publication_year":2017,"publication_date":"2017-10-27","ids":{"openalex":"https://openalex.org/W2766393343","doi":"https://doi.org/10.1145/3133956.3133985","mag":"2766393343"},"language":"en","primary_location":{"id":"doi:10.1145/3133956.3133985","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3133985","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034926702","display_name":"Muhammad Yasin","orcid":"https://orcid.org/0000-0001-9475-2796"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Muhammad Yasin","raw_affiliation_strings":["New York University, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"New York University, New York, NY, USA","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101970784","display_name":"Abhrajit Sengupta","orcid":"https://orcid.org/0000-0002-5491-6714"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abhrajit Sengupta","raw_affiliation_strings":["New York University, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"New York University, New York, NY, USA","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103844240","display_name":"Mohammed Thari Nabeel","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohammed Thari Nabeel","raw_affiliation_strings":["New York University Abu Dhabi, Abu Dhabi, Uae"],"affiliations":[{"raw_affiliation_string":"New York University Abu Dhabi, Abu Dhabi, Uae","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076080488","display_name":"Mohammed Ashraf","orcid":"https://orcid.org/0000-0002-1256-7229"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohammed Ashraf","raw_affiliation_strings":["New York University Abu Dhabi, Abu Dhabi, Uae"],"affiliations":[{"raw_affiliation_string":"New York University Abu Dhabi, Abu Dhabi, Uae","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059126377","display_name":"Jeyavijayan Rajendran","orcid":"https://orcid.org/0000-0003-3687-3746"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jeyavijayan (JV) Rajendran","raw_affiliation_strings":["The University of Texas at Dallas &amp; Texas A&amp;M University, Richardson, TX, USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Dallas &amp; Texas A&amp;M University, Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059987567","display_name":"Ozgur Sinanoglu","orcid":"https://orcid.org/0000-0003-0782-0397"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ozgur Sinanoglu","raw_affiliation_strings":["New York University Abu Dhabi, Abu Dhabi, Uae"],"affiliations":[{"raw_affiliation_string":"New York University Abu Dhabi, Abu Dhabi, Uae","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5034926702"],"corresponding_institution_ids":["https://openalex.org/I57206974"],"apc_list":null,"apc_paid":null,"fwci":28.7226,"has_fulltext":false,"cited_by_count":323,"citation_normalized_percentile":{"value":0.99907322,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1601","last_page":"1618"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7835835814476013},{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.6348192691802979},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.6236034035682678},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5104738473892212},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.483138769865036},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.4580934941768646},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.424299955368042},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.3603127598762512},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2790147364139557},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2610035538673401},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12953805923461914}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7835835814476013},{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.6348192691802979},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.6236034035682678},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5104738473892212},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.483138769865036},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.4580934941768646},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.424299955368042},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.3603127598762512},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2790147364139557},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2610035538673401},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12953805923461914}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3133956.3133985","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3133985","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5720100993","display_name":null,"funder_award_id":"1319841","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1482046022","https://openalex.org/W1515903565","https://openalex.org/W1524250393","https://openalex.org/W1952517978","https://openalex.org/W1963105592","https://openalex.org/W2008819052","https://openalex.org/W2012032225","https://openalex.org/W2018094844","https://openalex.org/W2029979276","https://openalex.org/W2064541558","https://openalex.org/W2067276029","https://openalex.org/W2070402310","https://openalex.org/W2076611807","https://openalex.org/W2095410905","https://openalex.org/W2096474000","https://openalex.org/W2106409910","https://openalex.org/W2109623530","https://openalex.org/W2124954128","https://openalex.org/W2140904634","https://openalex.org/W2152406824","https://openalex.org/W2167381458","https://openalex.org/W2167668681","https://openalex.org/W2202385382","https://openalex.org/W2293877751","https://openalex.org/W2343475170","https://openalex.org/W2346502084","https://openalex.org/W2512558543","https://openalex.org/W2601109594","https://openalex.org/W2604352239","https://openalex.org/W2608329737","https://openalex.org/W2612812511","https://openalex.org/W2616325639","https://openalex.org/W2708742051","https://openalex.org/W2949969288","https://openalex.org/W2952980742","https://openalex.org/W3098521738"],"related_works":["https://openalex.org/W2293426816","https://openalex.org/W2750884072","https://openalex.org/W3202403423","https://openalex.org/W2284547673","https://openalex.org/W3202607186","https://openalex.org/W4312396578","https://openalex.org/W4380352299","https://openalex.org/W2028522822","https://openalex.org/W4378805928","https://openalex.org/W3161112328"],"abstract_inverted_index":{"Logic":[0],"locking":[1,40,53,62],"has":[2],"been":[3,36],"conceived":[4],"as":[5,32],"a":[6,29,80,114,126,150],"promising":[7],"proactive":[8],"defense":[9,49],"strategy":[10],"against":[11],"intellectual":[12],"property":[13],"(IP)":[14],"piracy,":[15],"counterfeiting,":[16],"hardware":[17],"Trojans,":[18],"reverse":[19],"engineering,":[20],"and":[21,73,121,128,135,168,173,181],"overbuilding":[22],"attacks.":[23,137],"Yet,":[24],"various":[25],"attacks":[26],"that":[27,112,155],"use":[28],"working":[30],"chip":[31],"an":[33,96,198],"oracle":[34],"have":[35],"launched":[37],"on":[38,197],"logic":[39,61],"to":[41,144,178],"successfully":[42],"retrieve":[43],"its":[44],"secret":[45,81,100],"key,":[46],"undermining":[47],"the":[48,68,71,77,90,99,103,107,118,140,158,192],"of":[50,67,70,79,106,142,184,195],"all":[51,133],"existing":[52],"techniques.":[54],"In":[55,176],"this":[56],"paper,":[57],"we":[58,187],"propose":[59],"stripped-functionality":[60],"(SFLL),":[63],"which":[64],"strips":[65],"some":[66],"functionality":[69,105],"design":[72,152],"hides":[74],"it":[75],"in":[76,202],"form":[78],"key(s),":[82],"thereby":[83],"rendering":[84],"on-chip":[85,97],"implementation":[86,164,194],"functionally":[87],"different":[88],"from":[89,191],"original":[91,104,122],"one.":[92],"When":[93],"loaded":[94],"onto":[95],"memory,":[98],"keys":[101],"restore":[102],"design.":[108],"Through":[109],"security-aware":[110],"synthesis":[111],"creates":[113],"controllable":[115],"mismatch":[116],"between":[117,132],"reverse-engineered":[119],"netlist":[120],"design,":[123],"SFLL":[124,143,196],"provides":[125],"quantifiable":[127],"provable":[129],"resilience":[130],"trade-off":[131],"known":[134],"anticipated":[136],"We":[138],"demonstrate":[139],"application":[141],"large":[145],"designs":[146],"(>100K":[147],"gates)":[148],"using":[149],"computer-aided":[151],"(CAD)":[153],"framework":[154],"ensures":[156],"attaining":[157],"desired":[159],"security":[160],"level":[161],"at":[162],"minimal":[163],"cost,":[165],"8%,":[166],"5%,":[167],"0.5%":[169],"for":[170],"area,":[171],"power,":[172],"delay,":[174],"respectively.":[175],"addition":[177],"theoretical":[179],"proofs":[180],"simulation":[182],"confirmation":[183],"SFLL's":[185],"security,":[186],"also":[188],"report":[189],"results":[190],"silicon":[193],"ARM":[199],"Cortex-M0":[200],"microprocessor":[201],"65nm":[203],"technology.":[204]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":29},{"year":2024,"cited_by_count":32},{"year":2023,"cited_by_count":39},{"year":2022,"cited_by_count":44},{"year":2021,"cited_by_count":51},{"year":2020,"cited_by_count":57},{"year":2019,"cited_by_count":53},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
