{"id":"https://openalex.org/W3189840180","doi":"https://doi.org/10.23919/mixdes52406.2021.9497537","title":"Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher","display_name":"Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher","publication_year":2021,"publication_date":"2021-06-24","ids":{"openalex":"https://openalex.org/W3189840180","doi":"https://doi.org/10.23919/mixdes52406.2021.9497537","mag":"3189840180"},"language":"en","primary_location":{"id":"doi:10.23919/mixdes52406.2021.9497537","is_oa":false,"landing_page_url":"https://doi.org/10.23919/mixdes52406.2021.9497537","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 28th International Conference on Mixed Design of Integrated Circuits and System","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024964362","display_name":"Jason Blocklove","orcid":"https://orcid.org/0009-0005-5619-4654"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jason Blocklove","raw_affiliation_strings":["Rochester Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041842160","display_name":"Steve Farris","orcid":null},"institutions":[{"id":"https://openalex.org/I4210093223","display_name":"L3Harris (United Kingdom)","ror":"https://ror.org/00kce5954","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210093223","https://openalex.org/I4210163537"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Steve Farris","raw_affiliation_strings":["L3Harris Technologies"],"affiliations":[{"raw_affiliation_string":"L3Harris Technologies","institution_ids":["https://openalex.org/I4210093223"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047411064","display_name":"Michael Kurdziel","orcid":null},"institutions":[{"id":"https://openalex.org/I4210093223","display_name":"L3Harris (United Kingdom)","ror":"https://ror.org/00kce5954","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210093223","https://openalex.org/I4210163537"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Michael Kurdziel","raw_affiliation_strings":["L3Harris Technologies"],"affiliations":[{"raw_affiliation_string":"L3Harris Technologies","institution_ids":["https://openalex.org/I4210093223"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071708090","display_name":"Marcin \u0141ukowiak","orcid":null},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Marcin Lukowiak","raw_affiliation_strings":["Rochester Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075568055","display_name":"Stanis\u0142aw Radziszowski","orcid":"https://orcid.org/0000-0002-1470-5517"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stanislaw Radziszowski","raw_affiliation_strings":["Rochester Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5024964362"],"corresponding_institution_ids":["https://openalex.org/I155173764"],"apc_list":null,"apc_paid":null,"fwci":0.4606,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.59135374,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"104","last_page":"109"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9846000075340271,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8773615956306458},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.854934811592102},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7592158317565918},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.6506712436676025},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.6092542409896851},{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.5009474754333496},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5005245208740234},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.4928910732269287},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.45550015568733215},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.4463881850242615},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41655904054641724},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40412595868110657},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3939272463321686},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12024387717247009}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8773615956306458},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.854934811592102},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7592158317565918},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.6506712436676025},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.6092542409896851},{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.5009474754333496},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5005245208740234},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.4928910732269287},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.45550015568733215},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.4463881850242615},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41655904054641724},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40412595868110657},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3939272463321686},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12024387717247009}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/mixdes52406.2021.9497537","is_oa":false,"landing_page_url":"https://doi.org/10.23919/mixdes52406.2021.9497537","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 28th International Conference on Mixed Design of Integrated Circuits and System","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1503638523","https://openalex.org/W1524250393","https://openalex.org/W1966092481","https://openalex.org/W1970852936","https://openalex.org/W2012725064","https://openalex.org/W2067276029","https://openalex.org/W2112965713","https://openalex.org/W2135211381","https://openalex.org/W2156256511","https://openalex.org/W2203950797","https://openalex.org/W2209780761","https://openalex.org/W2218847395","https://openalex.org/W2343475170","https://openalex.org/W2419784917","https://openalex.org/W2790282160","https://openalex.org/W2906713375","https://openalex.org/W2950385551","https://openalex.org/W2963001922","https://openalex.org/W2964312614","https://openalex.org/W3030624396","https://openalex.org/W3046280080","https://openalex.org/W3140586337","https://openalex.org/W4231363479","https://openalex.org/W6677105148","https://openalex.org/W6688331863","https://openalex.org/W6778727884","https://openalex.org/W6781332241"],"related_works":["https://openalex.org/W2724859555","https://openalex.org/W3040363299","https://openalex.org/W2536483783","https://openalex.org/W3160241274","https://openalex.org/W2800991926","https://openalex.org/W2795151239","https://openalex.org/W2913519194","https://openalex.org/W2903337714","https://openalex.org/W2756672502","https://openalex.org/W2007287520"],"abstract_inverted_index":{"At":[0],"different":[1,87],"stages":[2],"of":[3,18,36,60,84,89,93,99,122,137,186],"the":[4,16,19,37,72,82,187],"Integrated":[5],"Circuit":[6],"(IC)":[7],"lifecycle":[8],"there":[9],"are":[10],"attacks":[11],"which":[12,58,114],"threaten":[13],"to":[14,71,117,130,142,170,192],"compromise":[15],"integrity":[17],"design":[20,73],"through":[21],"piracy,":[22],"reverse":[23,52],"engineering,":[24],"hardware":[25,69,91,138],"Trojan":[26],"insertion,":[27],"side":[28],"channel":[29],"analysis,":[30],"and":[31,51,182],"other":[32],"physical":[33],"attacks.":[34,54],"Some":[35],"most":[38],"notable":[39],"challenges":[40],"in":[41,74,150],"this":[42,78,146,151,179],"field":[43],"deal":[44],"specifically":[45],"with":[46],"Intellectual":[47],"Property":[48],"(IP)":[49],"theft":[50],"engineering":[53],"One":[55],"method":[56,141,154],"by":[57,67],"some":[59],"these":[61],"concerns":[62],"can":[63],"be":[64,131,193],"addressed":[65],"is":[66,115,148,168,190],"introducing":[68],"obfuscation":[70,92,105,173],"various":[75],"forms.":[76],"In":[77],"work":[79],"we":[80],"evaluate":[81],"effectiveness":[83],"a":[85,94,100,110,156,162,183,196],"few":[86],"forms":[88,136],"netlist-level":[90],"16-bit":[95],"substitution":[96],"box":[97],"component":[98],"customizable":[101],"cipher":[102,160,189],"MK-3.":[103],"These":[104],"methods":[106],"were":[107],"attacked":[108],"using":[109,178],"satisfiability":[111],"(SAT)":[112],"attack,":[113],"able":[116],"iteratively":[118],"rule":[119],"out":[120],"classes":[121],"keys":[123],"at":[124,200],"once.":[125],"This":[126,153],"has":[127],"been":[128],"shown":[129,191],"very":[132],"effective":[133],"against":[134,145,195],"many":[135],"obfuscation.":[139],"A":[140],"successfully":[143],"defend":[144],"attack":[147,198],"described":[149],"paper.":[152],"introduces":[155],"modified":[157],"SIMON":[158,188],"block":[159],"as":[161],"One-way":[163],"Random":[164],"Function":[165],"(ORF)":[166],"that":[167],"used":[169],"generate":[171],"an":[172],"key.":[174],"The":[175],"S-box":[176],"obfuscated":[177],"32-bit":[180],"key":[181],"round-reduced":[184],"implementation":[185],"secure":[194],"SAT":[197],"for":[199],"least":[201],"5":[202],"days.":[203]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
