{"id":"https://openalex.org/W3035808436","doi":"https://doi.org/10.23919/date48585.2020.9116489","title":"Poisoning the (Data) Well in ML-Based CAD: A Case Study of Hiding Lithographic Hotspots","display_name":"Poisoning the (Data) Well in ML-Based CAD: A Case Study of Hiding Lithographic Hotspots","publication_year":2020,"publication_date":"2020-03-01","ids":{"openalex":"https://openalex.org/W3035808436","doi":"https://doi.org/10.23919/date48585.2020.9116489","mag":"3035808436"},"language":"en","primary_location":{"id":"doi:10.23919/date48585.2020.9116489","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date48585.2020.9116489","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100389879","display_name":"Kang Liu","orcid":"https://orcid.org/0000-0001-7231-8315"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kang Liu","raw_affiliation_strings":["New York University,Center for Cybersecurity,NY,USA,11201"],"affiliations":[{"raw_affiliation_string":"New York University,Center for Cybersecurity,NY,USA,11201","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069388936","display_name":"Benjamin Tan","orcid":"https://orcid.org/0000-0002-7642-3638"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Benjamin Tan","raw_affiliation_strings":["New York University,Center for Cybersecurity,NY,USA,11201"],"affiliations":[{"raw_affiliation_string":"New York University,Center for Cybersecurity,NY,USA,11201","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059648257","display_name":"Ramesh Karri","orcid":"https://orcid.org/0000-0001-7989-5617"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ramesh Karri","raw_affiliation_strings":["New York University,Center for Cybersecurity,NY,USA,11201"],"affiliations":[{"raw_affiliation_string":"New York University,Center for Cybersecurity,NY,USA,11201","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010950688","display_name":"Siddharth Garg","orcid":"https://orcid.org/0000-0002-6158-9512"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Siddharth Garg","raw_affiliation_strings":["New York University,Center for Cybersecurity,NY,USA,11201"],"affiliations":[{"raw_affiliation_string":"New York University,Center for Cybersecurity,NY,USA,11201","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100389879"],"corresponding_institution_ids":["https://openalex.org/I57206974"],"apc_list":null,"apc_paid":null,"fwci":3.0489,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.92908075,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"306","last_page":"309"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7574768662452698},{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.6885514855384827},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6152271628379822},{"id":"https://openalex.org/keywords/cad","display_name":"CAD","score":0.6083590984344482},{"id":"https://openalex.org/keywords/hotspot","display_name":"Hotspot (geology)","score":0.5593826770782471},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5094128251075745},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.5068004727363586},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.4974251091480255},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4695582687854767},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4605523645877838},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4576375484466553},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.4522850215435028},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.45046138763427734},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3810047507286072},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34504085779190063},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15120288729667664}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7574768662452698},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.6885514855384827},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6152271628379822},{"id":"https://openalex.org/C194789388","wikidata":"https://www.wikidata.org/wiki/Q17855283","display_name":"CAD","level":2,"score":0.6083590984344482},{"id":"https://openalex.org/C146481406","wikidata":"https://www.wikidata.org/wiki/Q105131","display_name":"Hotspot (geology)","level":2,"score":0.5593826770782471},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5094128251075745},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.5068004727363586},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.4974251091480255},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4695582687854767},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4605523645877838},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4576375484466553},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.4522850215435028},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.45046138763427734},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3810047507286072},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34504085779190063},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15120288729667664},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C199639397","wikidata":"https://www.wikidata.org/wiki/Q1788588","display_name":"Engineering drawing","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C8058405","wikidata":"https://www.wikidata.org/wiki/Q46255","display_name":"Geophysics","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/date48585.2020.9116489","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date48585.2020.9116489","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2057596653","https://openalex.org/W2068961782","https://openalex.org/W2773446523","https://openalex.org/W2794271438","https://openalex.org/W2797469317","https://openalex.org/W2804151869","https://openalex.org/W2806976363","https://openalex.org/W2807363941","https://openalex.org/W2911065142","https://openalex.org/W2936148765","https://openalex.org/W2942091739","https://openalex.org/W2945706499","https://openalex.org/W2946443981","https://openalex.org/W2953611638","https://openalex.org/W2962949351","https://openalex.org/W2963343288","https://openalex.org/W4247200422","https://openalex.org/W4298140072","https://openalex.org/W6739075321","https://openalex.org/W6750384299","https://openalex.org/W6750462152","https://openalex.org/W6765586002"],"related_works":["https://openalex.org/W1494208182","https://openalex.org/W4380075502","https://openalex.org/W4223943233","https://openalex.org/W4312200629","https://openalex.org/W4360585206","https://openalex.org/W4364306694","https://openalex.org/W4380086463","https://openalex.org/W4225161397","https://openalex.org/W4367364209","https://openalex.org/W3035808436"],"abstract_inverted_index":{"Machine":[0],"learning":[1],"(ML)":[2],"provides":[3],"state-of-the-art":[4],"performance":[5],"in":[6,44,64,74,89,137],"many":[7],"parts":[8],"of":[9,46,134],"computer-aided":[10],"design":[11],"(CAD)":[12],"flows.":[13],"However,":[14],"deep":[15],"neural":[16,54,106],"networks":[17],"(DNNs)":[18],"are":[19,99],"susceptible":[20],"to":[21,28,31,35,51],"various":[22],"adversarial":[23],"attacks,":[24],"including":[25,85],"data":[26,37,70,96],"poisoning":[27,97],"compromise":[29],"training":[30,36,69,95],"insert":[32],"backdoors.":[33],"Sensitivity":[34],"integrity":[38],"presents":[39],"a":[40,75,86,104,119],"security":[41],"vulnerability,":[42],"especially":[43],"light":[45],"malicious":[47],"insiders":[48],"who":[49],"want":[50],"cause":[52],"targeted":[53],"network":[55,107],"misbehavior.":[56],"In":[57],"this":[58,62],"study,":[59],"we":[60],"explore":[61],"threat":[63],"lithographic":[65],"hotspot":[66],"detection":[67],"via":[68],"poisoning,":[71],"where":[72],"hotspots":[73],"layout":[76],"clip":[77],"can":[78],"be":[79],"\"hidden\"":[80],"at":[81],"inference":[82],"time":[83],"by":[84],"trigger":[87,121],"shape":[88],"the":[90,132],"input.":[91],"We":[92],"show":[93],"that":[94,108],"attacks":[98],"feasible":[100],"and":[101],"stealthy,":[102],"demonstrating":[103],"backdoored":[105],"performs":[109],"normally":[110],"on":[111,116],"clean":[112],"inputs":[113,117],"but":[114],"misbehaves":[115],"when":[118],"backdoor":[120],"is":[122],"present.":[123],"Furthermore,":[124],"our":[125],"results":[126],"raise":[127],"some":[128],"fundamental":[129],"questions":[130],"about":[131],"robustness":[133],"ML-based":[135],"systems":[136],"CAD.":[138]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
