{"id":"https://openalex.org/W3035954314","doi":"https://doi.org/10.23919/date48585.2020.9116259","title":"A Particle Swarm Optimization Guided Approximate Key Search Attack on Logic Locking in The Absence of Scan Access","display_name":"A Particle Swarm Optimization Guided Approximate Key Search Attack on Logic Locking in The Absence of Scan Access","publication_year":2020,"publication_date":"2020-03-01","ids":{"openalex":"https://openalex.org/W3035954314","doi":"https://doi.org/10.23919/date48585.2020.9116259","mag":"3035954314"},"language":"en","primary_location":{"id":"doi:10.23919/date48585.2020.9116259","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date48585.2020.9116259","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030502691","display_name":"Rajit Karmakar","orcid":"https://orcid.org/0000-0001-7346-4955"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rajit Karmakar","raw_affiliation_strings":["Department of E&ECE, Indian Institute of Technology, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Department of E&ECE, Indian Institute of Technology, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077947010","display_name":"Santanu Chattopadhyay","orcid":"https://orcid.org/0000-0002-1227-0732"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Santanu Chattopadhyay","raw_affiliation_strings":["Department of E&ECE, Indian Institute of Technology, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Department of E&ECE, Indian Institute of Technology, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030502691"],"corresponding_institution_ids":["https://openalex.org/I145894827"],"apc_list":null,"apc_paid":null,"fwci":2.0793,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.86875726,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"448","last_page":"453"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9799000024795532,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.7345770001411438},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.715164303779602},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6460481286048889},{"id":"https://openalex.org/keywords/swarm-behaviour","display_name":"Swarm behaviour","score":0.45777034759521484},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2996552586555481},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2050304412841797},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12827655673027039}],"concepts":[{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.7345770001411438},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.715164303779602},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6460481286048889},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.45777034759521484},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2996552586555481},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2050304412841797},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12827655673027039}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/date48585.2020.9116259","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date48585.2020.9116259","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1524250393","https://openalex.org/W1903598717","https://openalex.org/W2001289891","https://openalex.org/W2012725064","https://openalex.org/W2095410905","https://openalex.org/W2152195021","https://openalex.org/W2499445168","https://openalex.org/W2543580944","https://openalex.org/W2766393343","https://openalex.org/W2771405182","https://openalex.org/W2782827709","https://openalex.org/W2791567389","https://openalex.org/W2800704481","https://openalex.org/W2944122409","https://openalex.org/W2946592689","https://openalex.org/W4254690223","https://openalex.org/W6724703443","https://openalex.org/W6747192307","https://openalex.org/W6762830639"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4288714711","https://openalex.org/W3200708550","https://openalex.org/W2771637876","https://openalex.org/W2736680465","https://openalex.org/W4294093918","https://openalex.org/W4240853094","https://openalex.org/W2810496283","https://openalex.org/W2170656329","https://openalex.org/W3131977017"],"abstract_inverted_index":{"Logic":[0],"locking":[1,22],"is":[2,48,106,192,212],"a":[3,97,189],"well":[4],"known":[5],"Design-for-Security(DfS)":[6],"technique":[7],"for":[8,175,183],"Intellectual":[9],"Property":[10],"(IP)":[11],"protection":[12],"of":[13,38,52,55,78,108,119,136,178,186,201,208],"digital":[14],"Integrated":[15],"Circuits(IC).":[16],"However,":[17],"various":[18],"attacks":[19,34,86],"on":[20,154],"logic":[21,40],"can":[23,35,130,151,166],"extract":[24],"the":[25,39,49,70,76,120,123,126,134,163,176,179,184,187,206,216],"secret":[26],"obfuscation":[27],"key":[28,112,165],"successfully.":[29],"Although":[30],"Boolean":[31],"Satisfiability":[32],"(SAT)":[33],"break":[36],"most":[37,118],"locked":[41],"circuits,":[42,181,188],"inability":[43],"to":[44,64],"deobfuscate":[45],"sequential":[46,157,203],"circuits":[47,204],"main":[50],"limitation":[51],"this":[53,62,93],"type":[54],"attacks.":[56],"Several":[57],"existing":[58,217],"defense":[59],"strategies":[60],"exploit":[61],"fact":[63],"thwart":[65],"SAT":[66,124],"attack":[67,103,128,196,218],"by":[68],"obfuscating":[69],"scan-based":[71],"Design-for-Testability":[72],"(DfT)":[73],"infrastructure.":[74],"In":[75,92],"absence":[77,135,207],"scan":[79,137,209],"access,":[80,210],"Model":[81,140],"Checking":[82,141],"based":[83],"circuit":[84],"unrolling":[85],"also":[87],"suffer":[88,146],"from":[89,147],"scalability":[90,148],"issues.":[91],"paper,":[94],"we":[95],"propose":[96],"particle":[98],"swarm":[99],"optimization":[100],"(PSO)":[101],"guided":[102],"framework,":[104],"which":[105,211],"capable":[107],"finding":[109],"an":[110],"approximate":[111],"that":[113,162],"produces":[114],"correct":[115,168],"output":[116],"in":[117,133,170,205],"cases.":[121],"Unlike":[122,139],"attacks,":[125,142],"proposed":[127,195],"framework":[129,197],"work":[131],"even":[132],"access.":[138],"it":[143],"does":[144],"not":[145,213],"issues,":[149],"thus":[150],"be":[152],"applied":[153],"significantly":[155],"large":[156,202],"circuits.":[158],"Experimental":[159],"results":[160],"show":[161],"derived":[164],"produce":[167],"outputs":[169],"more":[171],"than":[172],"99%":[173],"cases,":[174],"majority":[177],"benchmark":[180],"while":[182],"rest":[185],"minimal":[190],"error":[191],"observed.":[193],"The":[194],"enables":[198],"partial":[199],"activation":[200],"feasible":[214],"using":[215],"frameworks.":[219]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
