{"id":"https://openalex.org/W2896572950","doi":"https://doi.org/10.13154/tches.v2018.i3.293-330","title":"On the Difficulty of FSM-based Hardware Obfuscation","display_name":"On the Difficulty of FSM-based Hardware Obfuscation","publication_year":2018,"publication_date":"2018-08-14","ids":{"openalex":"https://openalex.org/W2896572950","doi":"https://doi.org/10.13154/tches.v2018.i3.293-330","mag":"2896572950"},"language":"en","primary_location":{"id":"pmh:oai:doaj.org/article:6cf82ea8b981471e98cd8dfa0c1bd695","is_oa":true,"landing_page_url":"https://doaj.org/article/6cf82ea8b981471e98cd8dfa0c1bd695","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)","raw_type":"article"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/6cf82ea8b981471e98cd8dfa0c1bd695","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044241451","display_name":"Marc Fyrbiak","orcid":"https://orcid.org/0000-0002-4266-7108"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Fyrbiak, Marc","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security, Ruhr-Universit\u00e4t Bochum"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security, Ruhr-Universit\u00e4t Bochum","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005275199","display_name":"Sebastian Wallat","orcid":"https://orcid.org/0000-0002-7429-1002"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wallat, Sebastian","raw_affiliation_strings":["University of Massachusetts,, Amherst, MA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Massachusetts,, Amherst, MA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071751239","display_name":"J D\u00e9chelotte","orcid":null},"institutions":[{"id":"https://openalex.org/I15057530","display_name":"Universit\u00e9 de Bordeaux","ror":"https://ror.org/057qpr032","country_code":"FR","type":"education","lineage":["https://openalex.org/I15057530"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"D\u00e9chelotte, Jonathan","raw_affiliation_strings":["University of Bordeaux"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Bordeaux","institution_ids":["https://openalex.org/I15057530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002428519","display_name":"Nils Albartus","orcid":"https://orcid.org/0000-0003-2449-1134"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Albartus, Nils","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security, Ruhr-Universit\u00e4t Bochum"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security, Ruhr-Universit\u00e4t Bochum","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017213982","display_name":"Sinan B\u00f6cker","orcid":"https://orcid.org/0009-0008-9052-126X"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"B\u00f6cker, Sinan","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security, Ruhr-Universit\u00e4t Bochum"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security, Ruhr-Universit\u00e4t Bochum","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012168703","display_name":"Russell Tessier","orcid":"https://orcid.org/0000-0003-0591-7566"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tessier, Russell","raw_affiliation_strings":["University of Massachusetts,, Amherst, MA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Massachusetts,, Amherst, MA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041748332","display_name":"Christof Paar","orcid":"https://orcid.org/0000-0001-8681-2277"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]},{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["DE","US"],"is_corresponding":false,"raw_author_name":"Paar, Christof","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security, Ruhr-Universit\u00e4t Bochum, Germany; University of Massachusetts Amherst, MA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security, Ruhr-Universit\u00e4t Bochum, Germany; University of Massachusetts Amherst, MA","institution_ids":["https://openalex.org/I904495901","https://openalex.org/I24603500"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5044241451"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":5.9363,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.97357184,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9235467910766602},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6356877088546753},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.39013317227363586},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3328239619731903},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3208824098110199},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21118876338005066}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9235467910766602},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6356877088546753},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.39013317227363586},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3328239619731903},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3208824098110199},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21118876338005066}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:doaj.org/article:6cf82ea8b981471e98cd8dfa0c1bd695","is_oa":true,"landing_page_url":"https://doaj.org/article/6cf82ea8b981471e98cd8dfa0c1bd695","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)","raw_type":"article"},{"id":"doi:10.13154/tches.v2018.i3.293-330","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tches.v2018.i3.293-330","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:6cf82ea8b981471e98cd8dfa0c1bd695","is_oa":true,"landing_page_url":"https://doaj.org/article/6cf82ea8b981471e98cd8dfa0c1bd695","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)","raw_type":"article"},"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2072721176","https://openalex.org/W2382007173","https://openalex.org/W4243252198","https://openalex.org/W4313128243","https://openalex.org/W2118300983","https://openalex.org/W2112962394","https://openalex.org/W3137189469","https://openalex.org/W4235530921","https://openalex.org/W2382501300","https://openalex.org/W3162240892"],"abstract_inverted_index":{"In":[0],"today\u2019s":[1],"Integrated":[2],"Circuit":[3],"(IC)":[4],"production":[5],"chains,":[6],"a":[7,36,165,184],"designer\u2019s":[8],"valuable":[9],"Intellectual":[10],"Property":[11],"(IP)":[12],"is":[13,63,86],"transparent":[14],"to":[15,22,52,113],"diverse":[16],"stakeholders":[17],"and":[18,48,71,158,179],"thus":[19],"inevitably":[20],"prone":[21],"piracy.":[23],"To":[24,104],"protect":[25],"against":[26],"this":[27,105],"threat,":[28],"numerous":[29],"defenses":[30],"based":[31,188],"on":[32,128,189],"the":[33,56,78,129,139,177],"obfuscation":[34,61,144,156,186],"of":[35,58,68,83,131,141,167,181],"circuit\u2019s":[37],"control":[38,93],"path,":[39],"i.e.":[40],"Finite":[41],"State":[42],"Machine":[43],"(FSM),":[44],"have":[45],"been":[46],"proposed":[47],"are":[49,74],"commonly":[50,75],"believed":[51],"be":[53,97],"secure.":[54],"However,":[55],"security":[57,79,140],"these":[59],"sequential":[60],"schemes":[62,157],"doubtful":[64],"since":[65],"realistic":[66,132],"capabilities":[67,135],"reverse":[69,110,133,198],"engineering":[70,111,134],"subsequent":[72],"manipulation":[73],"neglected":[76],"in":[77],"analysis.":[80],"The":[81],"contribution":[82],"our":[84,162],"work":[85],"threefold:":[87],"First,":[88],"we":[89,107,136,159,175],"demonstrate":[90,161],"how":[91],"high-level":[92],"path":[94],"information":[95],"can":[96],"automatically":[98],"extracted":[99],"from":[100],"third-party,":[101],"gate-level":[102,121],"netlists.":[103],"end,":[106],"extend":[108],"state-of-the-art":[109,142],"algorithms":[112],"deal":[114],"with":[115,124],"Field":[116],"Programmable":[117],"Gate":[118],"Array":[119],"(FPGA)":[120],"netlists":[122],"equipped":[123],"FSM":[125,143,155],"obfuscation.":[126],"Second,":[127],"basis":[130],"carefully":[137],"review":[138],"schemes.":[145],"We":[146],"reveal":[147],"several":[148,166],"generic":[149],"strategies":[150],"that":[151,193],"bypass":[152],"allegedly":[153],"secure":[154],"practically":[160],"attacks":[163],"for":[164],"hardware":[168],"designs,":[169],"including":[170],"cryptographic":[171],"IP":[172],"cores.":[173],"Third,":[174],"present":[176],"design":[178],"implementation":[180],"Hardware":[182],"Nanomites,":[183],"novel":[185],"scheme":[187],"partial":[190],"dynamic":[191],"reconfiguration":[192],"generically":[194],"mitigates":[195],"existing":[196],"algorithmic":[197],"engineering.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":9}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
