{"id":"https://openalex.org/W4399487662","doi":"https://doi.org/10.1145/3649476.3658753","title":"Flip-Lock: A Flip-Flop-Based Logic Locking Technique for Thwarting ML-based and Algorithmic Structural Attacks","display_name":"Flip-Lock: A Flip-Flop-Based Logic Locking Technique for Thwarting ML-based and Algorithmic Structural Attacks","publication_year":2024,"publication_date":"2024-06-10","ids":{"openalex":"https://openalex.org/W4399487662","doi":"https://doi.org/10.1145/3649476.3658753"},"language":"en","primary_location":{"id":"doi:10.1145/3649476.3658753","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649476.3658753","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Great Lakes Symposium on VLSI 2024","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3649476.3658753","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062494695","display_name":"Armin Darjani","orcid":"https://orcid.org/0000-0002-9174-8158"},"institutions":[{"id":"https://openalex.org/I78650965","display_name":"TU Dresden","ror":"https://ror.org/042aqky30","country_code":"DE","type":"education","lineage":["https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Armin Darjani","raw_affiliation_strings":["Computer Science, TU Dresden, Germany"],"affiliations":[{"raw_affiliation_string":"Computer Science, TU Dresden, Germany","institution_ids":["https://openalex.org/I78650965"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082979317","display_name":"Nima Kavand","orcid":"https://orcid.org/0000-0002-4588-5303"},"institutions":[{"id":"https://openalex.org/I78650965","display_name":"TU Dresden","ror":"https://ror.org/042aqky30","country_code":"DE","type":"education","lineage":["https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Nima Kavand","raw_affiliation_strings":["Computer Science, TU Dresden, Germany"],"affiliations":[{"raw_affiliation_string":"Computer Science, TU Dresden, Germany","institution_ids":["https://openalex.org/I78650965"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100755285","display_name":"Akash Kumar","orcid":"https://orcid.org/0000-0001-7125-1737"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Akash Kumar","raw_affiliation_strings":["Ruhr University Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5062494695"],"corresponding_institution_ids":["https://openalex.org/I78650965"],"apc_list":null,"apc_paid":null,"fwci":1.0371,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73685554,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"185","last_page":"191"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9740999937057495,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/flip-flop","display_name":"Flip-flop","score":0.9222209453582764},{"id":"https://openalex.org/keywords/lock","display_name":"Lock (firearm)","score":0.7064952850341797},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6848766803741455},{"id":"https://openalex.org/keywords/flip","display_name":"Flip","score":0.672370970249176},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.4112775921821594},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.33862218260765076},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.32372742891311646},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27853307127952576},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1283876895904541},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.0944560170173645},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08831986784934998},{"id":"https://openalex.org/keywords/structural-engineering","display_name":"Structural engineering","score":0.06752336025238037}],"concepts":[{"id":"https://openalex.org/C2781007278","wikidata":"https://www.wikidata.org/wiki/Q183406","display_name":"Flip-flop","level":3,"score":0.9222209453582764},{"id":"https://openalex.org/C174839445","wikidata":"https://www.wikidata.org/wiki/Q1134386","display_name":"Lock (firearm)","level":2,"score":0.7064952850341797},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6848766803741455},{"id":"https://openalex.org/C2776591724","wikidata":"https://www.wikidata.org/wiki/Q5459651","display_name":"Flip","level":3,"score":0.672370970249176},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.4112775921821594},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.33862218260765076},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.32372742891311646},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27853307127952576},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1283876895904541},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.0944560170173645},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08831986784934998},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.06752336025238037},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C190283241","wikidata":"https://www.wikidata.org/wiki/Q14599311","display_name":"Apoptosis","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3649476.3658753","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649476.3658753","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Great Lakes Symposium on VLSI 2024","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3649476.3658753","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649476.3658753","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Great Lakes Symposium on VLSI 2024","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1524250393","https://openalex.org/W2892708618","https://openalex.org/W3115465877","https://openalex.org/W3183146245","https://openalex.org/W3210794143","https://openalex.org/W4280640024","https://openalex.org/W4281670546","https://openalex.org/W4321608090","https://openalex.org/W4379115869","https://openalex.org/W4386763595","https://openalex.org/W4386763948"],"related_works":["https://openalex.org/W2944644673","https://openalex.org/W4394356971","https://openalex.org/W2936325888","https://openalex.org/W2482318635","https://openalex.org/W2733322820","https://openalex.org/W4256254028","https://openalex.org/W4236067172","https://openalex.org/W4248274330","https://openalex.org/W4301360729","https://openalex.org/W3142006478"],"abstract_inverted_index":{"Machine":[0],"learning":[1],"(ML)":[2],"and":[3,98],"algorithmic":[4],"structural":[5,13,26,70,101,141],"attacks":[6,142],"have":[7],"highlighted":[8],"the":[9,22,40,43,54,75,88,104,117,134,149,164],"possibility":[10],"of":[11,15,42,90,106,151],"utilizing":[12],"leakages":[14,27,102],"an":[16],"obfuscated":[17],"circuit":[18],"to":[19,36,66,96,120,136],"reverse":[20],"engineer":[21],"locking":[23,44,82],"mechanism.":[24],"These":[25],"are":[28],"rooted":[29],"in":[30,81,103],"security-agnostic":[31],"synthesis":[32,68],"tools":[33],"that":[34,60,78,131,161],"lead":[35],"discernible":[37],"patterns":[38],"within":[39,108],"vicinity":[41,105],"substructures.":[45],"This":[46],"paper":[47],"has":[48],"two":[49],"contributions.":[50],"Firstly,":[51],"we":[52,155],"present":[53],"innovative":[55],"Flip-lock,":[56],"a":[57,91,157],"novel":[58],"approach":[59],"utilizes":[61],"flip-flops":[62,80,107],"along":[63],"logic":[64],"gates":[65],"prevent":[67],"tools\u2019":[69],"leakages.":[71],"As":[72],"this":[73],"is":[74,87],"first":[76],"work":[77],"incorporates":[79],"structures,":[83],"our":[84,112,152],"second":[85],"contribution":[86],"development":[89],"comprehensive":[92],"analysis":[93,119,153],"tool":[94,113],"designed":[95],"identify":[97],"assess":[99],"potential":[100,125,168],"circuits.":[109],"We":[110,115],"name":[111],"Flip-attack.":[114],"employ":[116],"Flip-attack":[118],"strengthen":[121],"Flip-lock\u2019s":[122],"resilience":[123],"against":[124,167],"future":[126,169],"attacks.":[127],"Our":[128],"findings":[129],"demonstrate":[130],"Flip-lock":[132,147],"possesses":[133],"capability":[135],"neutralize":[137],"all":[138],"existing":[139],"state-of-the-art":[140],"effectively.":[143],"Furthermore,":[144],"by":[145],"enhancing":[146],"through":[148],"incorporation":[150],"tool,":[154],"establish":[156],"robust":[158],"defense":[159],"mechanism":[160],"can":[162],"safeguard":[163],"circuit\u2019s":[165],"security":[166],"threats.":[170]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
