{"id":"https://openalex.org/W4405182380","doi":"https://doi.org/10.1145/3658644.3691378","title":"Poster: BlindMarket: A Trustworthy Chip Designs Marketplace for IP Vendors and Users","display_name":"Poster: BlindMarket: A Trustworthy Chip Designs Marketplace for IP Vendors and Users","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405182380","doi":"https://doi.org/10.1145/3658644.3691378"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3691378","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691378","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691378","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691378","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073501003","display_name":"Zhaoxiang Liu","orcid":"https://orcid.org/0009-0008-4783-1481"},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhaoxiang Liu","raw_affiliation_strings":["Kansas State University, Manhattan, Kansas, USA"],"affiliations":[{"raw_affiliation_string":"Kansas State University, Manhattan, Kansas, USA","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029786051","display_name":"Ning Luo","orcid":"https://orcid.org/0000-0002-0638-037X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ning Luo","raw_affiliation_strings":["UIUC, Champaign, Illinois, USA"],"affiliations":[{"raw_affiliation_string":"UIUC, Champaign, Illinois, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022479765","display_name":"Samuel Judson","orcid":"https://orcid.org/0000-0003-1270-6601"},"institutions":[{"id":"https://openalex.org/I32971472","display_name":"Yale University","ror":"https://ror.org/03v76x132","country_code":"US","type":"education","lineage":["https://openalex.org/I32971472"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Samuel Judson","raw_affiliation_strings":["Yale University, New Haven, Connecticut, USA"],"affiliations":[{"raw_affiliation_string":"Yale University, New Haven, Connecticut, USA","institution_ids":["https://openalex.org/I32971472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081696966","display_name":"Raj Gautam Dutta","orcid":"https://orcid.org/0000-0002-5686-5666"},"institutions":[{"id":"https://openalex.org/I93085520","display_name":"Silicon Labs (United States)","ror":"https://ror.org/02dyqfb80","country_code":"US","type":"company","lineage":["https://openalex.org/I93085520"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Raj Gautam Dutta","raw_affiliation_strings":["Silicon Assurance, Gainesville, Florida, USA"],"affiliations":[{"raw_affiliation_string":"Silicon Assurance, Gainesville, Florida, USA","institution_ids":["https://openalex.org/I93085520"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011794280","display_name":"Xiaolong Guo","orcid":"https://orcid.org/0000-0001-9896-9407"},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaolong Guo","raw_affiliation_strings":["Kansas State University, Manhattan, Kansas, USA"],"affiliations":[{"raw_affiliation_string":"Kansas State University, Manhattan, Kansas, USA","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031902968","display_name":"Mark Santolucito","orcid":"https://orcid.org/0000-0001-8646-4364"},"institutions":[{"id":"https://openalex.org/I98540497","display_name":"Barnard College","ror":"https://ror.org/04rt94r53","country_code":"US","type":"education","lineage":["https://openalex.org/I98540497"]},{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mark Santolucito","raw_affiliation_strings":["Barnard College, Columbia University, New York City, New York, USA"],"affiliations":[{"raw_affiliation_string":"Barnard College, Columbia University, New York City, New York, USA","institution_ids":["https://openalex.org/I98540497","https://openalex.org/I78577930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5073501003"],"corresponding_institution_ids":["https://openalex.org/I189590672"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24514784,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"5048","last_page":"5050"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9757000207901001,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8007352352142334},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5716260075569153},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5521041750907898},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.5408563613891602},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4905642867088318},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.42417624592781067},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.4186948239803314},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4173828065395355},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.16134685277938843},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12738418579101562}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8007352352142334},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5716260075569153},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5521041750907898},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.5408563613891602},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4905642867088318},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.42417624592781067},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.4186948239803314},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4173828065395355},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.16134685277938843},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12738418579101562},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3691378","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691378","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691378","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3691378","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691378","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691378","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405182380.pdf","grobid_xml":"https://content.openalex.org/works/W4405182380.grobid-xml"},"referenced_works_count":7,"referenced_works":["https://openalex.org/W2057361103","https://openalex.org/W2062897452","https://openalex.org/W2108987401","https://openalex.org/W2763801910","https://openalex.org/W2888632077","https://openalex.org/W3091772858","https://openalex.org/W4312121029"],"related_works":["https://openalex.org/W2280422768","https://openalex.org/W3143197806","https://openalex.org/W4252555497","https://openalex.org/W3121175838","https://openalex.org/W3016293053","https://openalex.org/W1690653314","https://openalex.org/W2401723157","https://openalex.org/W2065055572","https://openalex.org/W2784269775","https://openalex.org/W2952904874"],"abstract_inverted_index":{"Due":[0],"to":[1,55,65,100,120,139,146,159,182,195],"the":[2,5,45,57,68,72,102,107,123,141,144,147,161,184,189],"globalization":[3],"of":[4,59,106,143,164],"semiconductor":[6],"supply":[7],"chain,":[8],"chip":[9],"fabrication":[10],"now":[11],"involves":[12],"multiple":[13,28],"parties,":[14],"including":[15],"intellectual":[16],"property":[17],"(IP)":[18],"vendors":[19,119],"and":[20,30,36,41,91,104,117,126,133,179],"Electronic":[21],"Design":[22],"Automation":[23],"(EDA)":[24],"tool":[25],"vendors.":[26,93],"Involving":[27],"entities":[29],"valuable":[31],"IP":[32,50,89,92,115,118],"naturally":[33],"raises":[34],"security":[35,103],"privacy":[37,105],"concerns.":[38],"Various":[39],"frameworks":[40],"tools,":[42],"such":[43],"as":[44],"IEEE":[46],"1735":[47],"standard":[48],"for":[49],"protection,":[51],"have":[52],"been":[53],"developed":[54],"mitigate":[56],"risk":[58],"theft.":[60],"However,":[61],"existing":[62],"solutions":[63],"fail":[64],"address":[66],"all":[67],"threats":[69],"envisioned":[70],"by":[71],"zero-trust":[73,79],"model.":[74],"We":[75,187],"propose":[76],"a":[77,152],"novel":[78],"formal":[80],"verification":[81,109,185],"framework":[82,95],"that":[83],"requires":[84],"only":[85],"two":[86],"essential":[87],"parties:":[88],"users":[90,116],"This":[94,149],"leverages":[96,175],"secure":[97,154],"multiparty":[98],"computation":[99],"ensure":[101],"hardware":[108,124,169,177],"process.":[110,186],"Our":[111,172],"proposed":[112],"solution":[113],"allows":[114],"independently":[121],"convert":[122],"design":[125,145,170],"assertions":[127],"into":[128],"conjunctive":[129],"normal":[130],"form":[131],"(CNF),":[132],"then":[134],"apply":[135],"privacy-preserving":[136],"SAT":[137,166],"solving":[138,167],"verify":[140],"conformance":[142],"specification.":[148],"paper":[150],"introduces":[151],"domain-specific":[153,180],"decision":[155],"procedure,":[156],"hw-ppSAT,":[157],"designed":[158],"overcome":[160],"scalability":[162],"challenges":[163],"using":[165],"in":[168],"verification.":[171],"approach":[173],"also":[174],"property-based":[176],"optimizations":[178],"heuristics":[181],"enhance":[183],"showcase":[188],"framework's":[190],"effectiveness":[191],"through":[192],"its":[193],"application":[194],"several":[196],"open-source":[197],"benchmarks.":[198]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
