{"id":"https://openalex.org/W2911099519","doi":"https://doi.org/10.1145/3287624.3287698","title":"Layout recognition attacks on split manufacturing","display_name":"Layout recognition attacks on split manufacturing","publication_year":2019,"publication_date":"2019-01-18","ids":{"openalex":"https://openalex.org/W2911099519","doi":"https://doi.org/10.1145/3287624.3287698","mag":"2911099519"},"language":"en","primary_location":{"id":"doi:10.1145/3287624.3287698","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3287624.3287698","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3287624.3287698","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3287624.3287698","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055673445","display_name":"Wenbin Xu","orcid":"https://orcid.org/0000-0001-5165-8556"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wenbin Xu","raw_affiliation_strings":["Texas A&amp;M University"],"affiliations":[{"raw_affiliation_string":"Texas A&amp;M University","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056805627","display_name":"Lang Feng","orcid":"https://orcid.org/0000-0001-9943-0550"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lang Feng","raw_affiliation_strings":["Texas A&amp;M University"],"affiliations":[{"raw_affiliation_string":"Texas A&amp;M University","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059126377","display_name":"Jeyavijayan Rajendran","orcid":"https://orcid.org/0000-0003-3687-3746"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jeyavijayan (JV) Rajendran","raw_affiliation_strings":["Texas A&amp;M University"],"affiliations":[{"raw_affiliation_string":"Texas A&amp;M University","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103246390","display_name":"Jiang Hu","orcid":"https://orcid.org/0000-0003-1157-7799"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiang Hu","raw_affiliation_strings":["Texas A&amp;M University"],"affiliations":[{"raw_affiliation_string":"Texas A&amp;M University","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5055673445"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.9749,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.85343627,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"45","last_page":"50"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9286999702453613,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.799667477607727},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7219861745834351},{"id":"https://openalex.org/keywords/bijection","display_name":"Bijection","score":0.597953200340271},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.5713875889778137},{"id":"https://openalex.org/keywords/boolean-satisfiability-problem","display_name":"Boolean satisfiability problem","score":0.4339383840560913},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.336259126663208},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3306746482849121},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.28920644521713257},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10010036826133728}],"concepts":[{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.799667477607727},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7219861745834351},{"id":"https://openalex.org/C24424167","wikidata":"https://www.wikidata.org/wiki/Q180907","display_name":"Bijection","level":2,"score":0.597953200340271},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.5713875889778137},{"id":"https://openalex.org/C6943359","wikidata":"https://www.wikidata.org/wiki/Q875276","display_name":"Boolean satisfiability problem","level":2,"score":0.4339383840560913},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.336259126663208},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3306746482849121},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.28920644521713257},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10010036826133728},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3287624.3287698","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3287624.3287698","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3287624.3287698","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3287624.3287698","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3287624.3287698","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3287624.3287698","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G344477298","display_name":null,"funder_award_id":"CNS-1618824,CNS-1618797","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7260043878","display_name":"STARSS: Small: Collaborative: Physical Design for Secure Split Manufacturing of ICs","funder_award_id":"1618824","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7794224995","display_name":null,"funder_award_id":"CNS-1618824","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G817355397","display_name":null,"funder_award_id":"2016-TS-2688,2016-TS-2689","funder_id":"https://openalex.org/F4320306087","funder_display_name":"Semiconductor Research Corporation"},{"id":"https://openalex.org/G8285588879","display_name":"STARSS: Small: Collaborative: Physical Design for Secure Split Manufacturing of ICs","funder_award_id":"1618797","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306087","display_name":"Semiconductor Research Corporation","ror":"https://ror.org/047z4n946"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2911099519.pdf","grobid_xml":"https://content.openalex.org/works/W2911099519.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1482046022","https://openalex.org/W1547478380","https://openalex.org/W1782800369","https://openalex.org/W1952517978","https://openalex.org/W2083314129","https://openalex.org/W2092545762","https://openalex.org/W2093405763","https://openalex.org/W2105714044","https://openalex.org/W2115270812","https://openalex.org/W2142135738","https://openalex.org/W2161998562","https://openalex.org/W2404942596","https://openalex.org/W2588316945","https://openalex.org/W2599428882","https://openalex.org/W2612718941","https://openalex.org/W2762256361","https://openalex.org/W2764108704","https://openalex.org/W2789818322","https://openalex.org/W2790776596","https://openalex.org/W4230202452","https://openalex.org/W4234937017","https://openalex.org/W4249050566","https://openalex.org/W4255796103"],"related_works":["https://openalex.org/W2724859555","https://openalex.org/W3040363299","https://openalex.org/W2536483783","https://openalex.org/W3160241274","https://openalex.org/W2800991926","https://openalex.org/W2795151239","https://openalex.org/W2903337714","https://openalex.org/W2756672502","https://openalex.org/W2408034367","https://openalex.org/W4251860244"],"abstract_inverted_index":{"One":[0],"technique":[1,72,135,152],"to":[2,21,50,111],"prevent":[3],"attacks":[4],"from":[5],"an":[6,188],"untrusted":[7,23,37],"foundry":[8,38],"is":[9,19,29,73,86],"split":[10,196],"manufacturing,":[11],"where":[12],"only":[13],"a":[14,32,132,171],"part":[15],"of":[16,114,124],"the":[17,22,27,44,55,69,92,99,107,112,149,155,166,177],"layout":[18,42,56],"sent":[20],"high-end":[24],"foundry,":[25],"and":[26,43,48,169,190],"rest":[28],"manufactured":[30],"at":[31,176],"trusted":[33],"low-end":[34],"foundry.":[35],"The":[36,185],"has":[39,170],"front-end-of-line":[40],"(FEOL)":[41],"original":[45],"circuit":[46],"netlist":[47],"attempts":[49],"identify":[51],"critical":[52],"components":[53],"on":[54,117,137],"for":[57,63,163,180,193],"Trojan":[58],"insertion.":[59],"Although":[60],"defense":[61,93],"methods":[62,94],"this":[64,121],"scenario":[65],"have":[66],"been":[67],"developed,":[68],"corresponding":[70],"attack":[71,85,118,134,146,151],"not":[74],"well":[75],"explored.":[76],"For":[77],"instance,":[78],"Boolean":[79],"satisfiability":[80],"(SAT)":[81],"based":[82,136],"bijective":[83,127,144],"mapping":[84,128,145],"mentioned":[87],"without":[88,102,165],"detailed":[89],"research.":[90],"Hence,":[91],"are":[95],"mostly":[96],"evaluated":[97],"with":[98,143,159,182],"k-security":[100,167,183,194],"metric":[101],"actual":[103],"attacks.":[104],"We":[105],"provide":[106],"first":[108],"systematic":[109],"study,":[110],"best":[113],"our":[115],"knowledge,":[116],"techniques":[119],"in":[120,195],"scenario.":[122],"Besides":[123],"implementing":[125],"SAT-based":[126],"attack,":[129],"we":[130],"develop":[131],"new":[133,150],"structural":[138],"pattern":[139],"matching.":[140],"Experimental":[141],"comparison":[142],"shows":[147],"that":[148],"achieves":[153],"about":[154],"same":[156,178],"success":[157,174],"rate":[158,175],"much":[160,172],"faster":[161],"speed":[162],"cases":[164,181],"defense,":[168],"better":[173],"runtime":[179],"defense.":[184],"results":[186],"offer":[187],"alternative":[189],"practical":[191],"interpretation":[192],"manufacturing.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
