{"id":"https://openalex.org/W3195179447","doi":"https://doi.org/10.22042/isecure.2021.234848.557","title":"An Obfuscation Method Based on CFGLUTs for Security of FPGAs","display_name":"An Obfuscation Method Based on CFGLUTs for Security of FPGAs","publication_year":2021,"publication_date":"2021-07-01","ids":{"openalex":"https://openalex.org/W3195179447","doi":"https://doi.org/10.22042/isecure.2021.234848.557","mag":"3195179447"},"language":"en","primary_location":{"id":"mag:3195179447","is_oa":false,"landing_page_url":"http://www.isecure-journal.com/article_132145_cc13a3c3fd2c080a4d90c55bfbabb132.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306532254","display_name":"Isecure.","issn_l":"2008-2045","issn":["2008-2045","2008-3076"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319049","host_organization_name":"Iranian Society of Criptology","host_organization_lineage":["https://openalex.org/P4310319049"],"host_organization_lineage_names":["Iranian Society of Criptology"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":"Isecure.","raw_type":null},"type":"article","indexed_in":[],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023197268","display_name":"Mansoureh Labafniya","orcid":null},"institutions":[{"id":"https://openalex.org/I39268498","display_name":"University of Isfahan","ror":"https://ror.org/05h9t7759","country_code":"IR","type":"education","lineage":["https://openalex.org/I39268498"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mansoureh Labafniya","raw_affiliation_strings":["[Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran]"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"[Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran]","institution_ids":["https://openalex.org/I39268498"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005532865","display_name":"Shahram Etemadi Borujeni","orcid":"https://orcid.org/0000-0002-0959-3952"},"institutions":[{"id":"https://openalex.org/I39268498","display_name":"University of Isfahan","ror":"https://ror.org/05h9t7759","country_code":"IR","type":"education","lineage":["https://openalex.org/I39268498"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Shahram Etemadi Borujeni","raw_affiliation_strings":["[Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran]"],"raw_orcid":"https://orcid.org/0000-0002-0959-3952","affiliations":[{"raw_affiliation_string":"[Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran]","institution_ids":["https://openalex.org/I39268498"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5023197268"],"corresponding_institution_ids":["https://openalex.org/I39268498"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12616894,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"2","first_page":"157","last_page":"162"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9717000126838684,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bitstream","display_name":"Bitstream","score":0.9157369136810303},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.901528000831604},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.822320818901062},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7741336226463318},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.7694200277328491},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6686561107635498},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6420897245407104},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.45767566561698914},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.37969863414764404},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.24263277649879456},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21238064765930176},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2026737928390503},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.11345934867858887}],"concepts":[{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.9157369136810303},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.901528000831604},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.822320818901062},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7741336226463318},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.7694200277328491},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6686561107635498},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6420897245407104},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.45767566561698914},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.37969863414764404},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.24263277649879456},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21238064765930176},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2026737928390503},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.11345934867858887},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"mag:3195179447","is_oa":false,"landing_page_url":"http://www.isecure-journal.com/article_132145_cc13a3c3fd2c080a4d90c55bfbabb132.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306532254","display_name":"Isecure.","issn_l":"2008-2045","issn":["2008-2045","2008-3076"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319049","host_organization_name":"Iranian Society of Criptology","host_organization_lineage":["https://openalex.org/P4310319049"],"host_organization_lineage_names":["Iranian Society of Criptology"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"Isecure.","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2910822168","https://openalex.org/W2744497744","https://openalex.org/W3025090175","https://openalex.org/W2990238172","https://openalex.org/W2759901721","https://openalex.org/W2896572950","https://openalex.org/W3183543911","https://openalex.org/W3088996813","https://openalex.org/W3208279905","https://openalex.org/W3104593559","https://openalex.org/W2298907189","https://openalex.org/W2153622528","https://openalex.org/W2794167432","https://openalex.org/W3202607186","https://openalex.org/W3112733880","https://openalex.org/W2156256511","https://openalex.org/W2075795621","https://openalex.org/W2754409419","https://openalex.org/W3207940480","https://openalex.org/W3083859209"],"abstract_inverted_index":{"There":[0],"are":[1,80,166],"many":[2],"different":[3],"ways":[4],"of":[5,14,77,89,113,118,129,140,144,168],"securing":[6,160],"FPGAs":[7,33,161],"to":[8,31,59,101,109],"prevent":[9,32],"successful":[10,35],"reverse":[11,36,125,169],"engineering.":[12,170],"One":[13],"the":[15,70,78,87,90,94,105,111,114,119,127,130,135],"common":[16],"forms":[17],"is":[18,50,142,149],"obfuscation":[19,30,48],"methods.":[20],"In":[21,72],"this":[22,73],"paper,":[23],"we":[24],"proposed":[25],"an":[26,122],"approach":[27],"based":[28,64],"on":[29,65,81,150],"from":[34],"engineering":[37],"and,":[38],"as":[39],"a":[40,82,151],"result,":[41],"Hardware":[42],"Trojan":[43],"Horses":[44],"(HTHs)":[45],"insertion.":[46],"Our":[47,171],"method":[49],"using":[51],"ConFiGurable":[52],"Look":[53],"Up":[54],"Tables":[55],"(CFGLUTs).":[56],"We":[57,103],"suggest":[58],"insert":[60],"CFGLUTs":[61,91,106,158],"randomly":[62],"or":[63],"some":[66,75,138],"optional":[67],"parameters":[68],"in":[69,107],"design.":[71,120],"way,":[74],"parts":[76],"design":[79,136],"secure":[83,152],"memory,":[84],"which":[85,146,165],"contains":[86],"bitstream":[88,112,128,148],"so":[92],"that":[93],"attacker":[95,123],"does":[96],"not":[97,174],"have":[98,175],"any":[99,176],"access":[100],"it.":[102],"program":[104],"run-time":[108],"complete":[110],"FPGA":[115],"and":[116,178],"functionality":[117],"If":[121],"can":[124],"engineer":[126],"FPGA,":[131],"he":[132],"cannot":[133],"detect":[134],"because":[137],"part":[139],"it":[141],"composed":[143],"CFGLUTs,":[145],"their":[147],"memory.":[153],"The":[154],"first":[155],"article":[156],"uses":[157],"for":[159],"against":[162],"HTHs":[163],"insertion,":[164],"results":[167],"methods":[172],"do":[173],"power":[177],"hardware":[179],"overhead":[180],"but":[181],"32":[182],"clock":[183],"cycles":[184],"time":[185],"overhead.":[186]},"counts_by_year":[],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
