{"id":"https://openalex.org/W2946593940","doi":"https://doi.org/10.1145/3299874.3319495","title":"Threats on Logic Locking","display_name":"Threats on Logic Locking","publication_year":2019,"publication_date":"2019-05-13","ids":{"openalex":"https://openalex.org/W2946593940","doi":"https://doi.org/10.1145/3299874.3319495","mag":"2946593940"},"language":"en","primary_location":{"id":"doi:10.1145/3299874.3319495","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3299874.3319495","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 Great Lakes Symposium on VLSI","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031747364","display_name":"Kimia Zamiri Azar","orcid":"https://orcid.org/0000-0001-5684-100X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kimia Zamiri Azar","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101538655","display_name":"Hadi Mardani Kamali","orcid":"https://orcid.org/0000-0002-4246-6736"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hadi Mardani Kamali","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047382437","display_name":"Houman Homayoun","orcid":"https://orcid.org/0000-0001-8904-4699"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Houman Homayoun","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060036961","display_name":"Avesta Sasan","orcid":"https://orcid.org/0000-0002-4052-8075"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Avesta Sasan","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5031747364"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":8.6676,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.98434646,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"471","last_page":"476"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9796000123023987,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9528999924659729,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8603936433792114},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.7479791045188904},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7178999781608582},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6298362016677856},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5935747623443604},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47778090834617615},{"id":"https://openalex.org/keywords/automotive-industry","display_name":"Automotive industry","score":0.41827985644340515},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.28525859117507935},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18755698204040527}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8603936433792114},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.7479791045188904},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7178999781608582},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6298362016677856},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5935747623443604},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47778090834617615},{"id":"https://openalex.org/C526921623","wikidata":"https://www.wikidata.org/wiki/Q190117","display_name":"Automotive industry","level":2,"score":0.41827985644340515},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.28525859117507935},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18755698204040527},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3299874.3319495","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3299874.3319495","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 Great Lakes Symposium on VLSI","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1524250393","https://openalex.org/W1963105592","https://openalex.org/W2008819052","https://openalex.org/W2064541558","https://openalex.org/W2067276029","https://openalex.org/W2095410905","https://openalex.org/W2124954128","https://openalex.org/W2157661732","https://openalex.org/W2394517960","https://openalex.org/W2419784917","https://openalex.org/W2499445168","https://openalex.org/W2536656707","https://openalex.org/W2587958472","https://openalex.org/W2615010670","https://openalex.org/W2615060729","https://openalex.org/W2616325639","https://openalex.org/W2626492933","https://openalex.org/W2708742051","https://openalex.org/W2741711485","https://openalex.org/W2747980214","https://openalex.org/W2766393343","https://openalex.org/W2772235844","https://openalex.org/W2798443351","https://openalex.org/W2798912380","https://openalex.org/W2807607203","https://openalex.org/W2899848879","https://openalex.org/W2902639362","https://openalex.org/W2903107655","https://openalex.org/W2909895117","https://openalex.org/W2945305016","https://openalex.org/W2963001922","https://openalex.org/W2964312614","https://openalex.org/W3105554950","https://openalex.org/W3106433382","https://openalex.org/W4246305008"],"related_works":["https://openalex.org/W2900235625","https://openalex.org/W305289975","https://openalex.org/W2967042990","https://openalex.org/W4310153678","https://openalex.org/W1491018131","https://openalex.org/W2069676976","https://openalex.org/W3021304233","https://openalex.org/W3205555654","https://openalex.org/W2335214039","https://openalex.org/W2947880788"],"abstract_inverted_index":{"To":[0,68],"reduce":[1,69],"the":[2,9,42,70,83,94,97,100,104,107,112,120,124,140],"cost":[3],"of":[4,15,38,56,72,96,106,149,170],"ICs":[5,98],"and":[6,23,36,50,61,78,89,131,160,182,186],"to":[7,64,119],"meet":[8],"market's":[10],"demand,":[11],"a":[12,30,66,168],"considerable":[13],"portion":[14],"manufacturing":[16,33,74],"supply":[17,34,43,81],"chain,":[18,35,82],"including":[19,54],"silicon":[20],"fabrication,":[21],"packaging":[22],"testing":[24],"may":[25],"be":[26,192],"pushed":[27],"offshore.":[28],"Utilizing":[29],"global":[31],"IC":[32,73],"inclusion":[37],"non-trusted":[39],"parties":[40],"in":[41,75,143,151,156],"chain":[44],"has":[45,154],"raised":[46],"concerns":[47],"over":[48],"security":[49],"trust":[51],"related":[52],"challenges":[53],"those":[55],"overproduction,":[57],"counterfeiting,":[58],"IP":[59,108],"piracy,":[60],"Hardware":[62],"Trojans":[63],"name":[65],"few.":[67],"risk":[71],"an":[76,176],"untrusted":[77],"globally":[79],"distributed":[80],"researchers":[84],"have":[85],"proposed":[86,129],"various":[87],"locking":[88,132],"obfuscation":[90,130,174],"mechanisms":[91,133],"for":[92,194],"hiding":[93],"functionality":[95],"during":[99],"manufacturing,":[101],"that":[102,115,138,190],"requires":[103],"activation":[105],"after":[109],"fabrication":[110],"using":[111],"key":[113],"value(s)":[114],"is":[116],"only":[117],"known":[118],"IP/IC":[121],"owner.":[122],"At":[123],"same":[125],"time,":[126],"many":[127,157],"such":[128,144,158],"are":[134],"broken":[135],"with":[136],"attacks":[137],"exploit":[139],"inherent":[141],"vulnerabilities":[142],"solutions.":[145,162],"The":[146],"past":[147],"decade":[148,169],"research":[150,171],"this":[152,164],"area,":[153],"resulted":[155],"defense":[159,183],"attack":[161,181],"In":[163],"paper,":[165],"we":[166],"review":[167],"on":[172,180],"hardware":[173],"from":[175],"attacker":[177],"perspective,":[178],"elaborate":[179],"lessons":[184],"learned,":[185],"discuss":[187],"future":[188],"directions":[189],"could":[191],"exploited":[193],"building":[195],"stronger":[196],"defenses.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
