{"id":"https://openalex.org/W3030260461","doi":"https://doi.org/10.29007/7tpd","title":"Sensitivity Analysis of Locked Circuits","display_name":"Sensitivity Analysis of Locked Circuits","publication_year":2020,"publication_date":"2020-05-27","ids":{"openalex":"https://openalex.org/W3030260461","doi":"https://doi.org/10.29007/7tpd","mag":"3030260461"},"language":"en","primary_location":{"id":"doi:10.29007/7tpd","is_oa":true,"landing_page_url":"https://doi.org/10.29007/7tpd","pdf_url":"https://easychair.org/publications/open/HHHP","source":{"id":"https://openalex.org/S4220651395","display_name":"EPiC series in computing","issn_l":"2398-7340","issn":["2398-7340"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EPiC Series in Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://easychair.org/publications/open/HHHP","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101814610","display_name":"Joseph Sweeney","orcid":"https://orcid.org/0000-0002-3775-8638"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Joseph Sweeney","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025921874","display_name":"Marijn J. H. Heule","orcid":"https://orcid.org/0000-0002-5587-8801"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Marijn J. H. Heule","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5004024474","display_name":"Lawrence T. Pileggi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lawrence Pileggi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101814610"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.1552,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.76103368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"73","issue":null,"first_page":"483","last_page":"467"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9380999803543091,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.6597931385040283},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.634742796421051},{"id":"https://openalex.org/keywords/lock","display_name":"Lock (firearm)","score":0.599299430847168},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5742075443267822},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.4854014813899994},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4325193166732788},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.39815640449523926},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.23871585726737976},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.16045477986335754},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.15254145860671997},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08963140845298767}],"concepts":[{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.6597931385040283},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.634742796421051},{"id":"https://openalex.org/C174839445","wikidata":"https://www.wikidata.org/wiki/Q1134386","display_name":"Lock (firearm)","level":2,"score":0.599299430847168},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5742075443267822},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.4854014813899994},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4325193166732788},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.39815640449523926},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.23871585726737976},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.16045477986335754},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15254145860671997},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08963140845298767},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.29007/7tpd","is_oa":true,"landing_page_url":"https://doi.org/10.29007/7tpd","pdf_url":"https://easychair.org/publications/open/HHHP","source":{"id":"https://openalex.org/S4220651395","display_name":"EPiC series in computing","issn_l":"2398-7340","issn":["2398-7340"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EPiC Series in Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.29007/7tpd","is_oa":true,"landing_page_url":"https://doi.org/10.29007/7tpd","pdf_url":"https://easychair.org/publications/open/HHHP","source":{"id":"https://openalex.org/S4220651395","display_name":"EPiC series in computing","issn_l":"2398-7340","issn":["2398-7340"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EPiC Series in Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3030260461.pdf","grobid_xml":"https://content.openalex.org/works/W3030260461.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W1500660230","https://openalex.org/W1524250393","https://openalex.org/W1580624776","https://openalex.org/W1787074469","https://openalex.org/W1940223960","https://openalex.org/W2012725064","https://openalex.org/W2022695609","https://openalex.org/W2069767473","https://openalex.org/W2095410905","https://openalex.org/W2133527541","https://openalex.org/W2614714000"],"related_works":["https://openalex.org/W2363983170","https://openalex.org/W2270181498","https://openalex.org/W2376330853","https://openalex.org/W4232879103","https://openalex.org/W4312978203","https://openalex.org/W4206642211","https://openalex.org/W3103471182","https://openalex.org/W1581225847","https://openalex.org/W4386784797","https://openalex.org/W2151783366"],"abstract_inverted_index":{"Globalization":[0],"of":[1,14,30,49,79,89,101],"integrated":[2],"circuits":[3,63,84],"manufacturing":[4],"has":[5],"led":[6],"to":[7,36,39,53,103,112],"increased":[8],"security":[9],"con-":[10],"cerns,":[11],"notably":[12],"theft":[13],"intellectual":[15],"property.":[16],"In":[17,42],"response,":[18],"logic":[19,92],"locking":[20],"techniques":[21,32],"have":[22,33],"been":[23,34],"developed":[24],"for":[25,82],"protecting":[26],"designs,":[27],"but":[28],"many":[29],"these":[31,55],"shown":[35,111],"be":[37,113],"vulnerable":[38],"SAT-based":[40],"attacks.":[41],"this":[43,80,105],"paper,":[44],"we":[45],"explore":[46],"the":[47,77,108],"use":[48],"Boolean":[50],"sensi-":[51],"tivity":[52],"analyze":[54],"locked":[56,85],"circuits.":[57],"We":[58,74,96],"show":[59],"that":[60],"in":[61],"typical":[62],"there":[64],"is":[65,110],"an":[66,99],"inverse":[67],"relationship":[68,81],"between":[69],"input":[70],"width":[71],"and":[72],"sensitivity.":[73],"then":[75],"demonstrate":[76],"utility":[78],"deobfuscating":[83],"with":[86,98],"a":[87],"class":[88],"\u201cprovably":[90],"secure\u201d":[91],"lock-":[93],"ing":[94],"techniques.":[95],"conclude":[97],"example":[100],"how":[102],"resist":[104],"attack,":[106],"although":[107],"resistance":[109],"highly":[114],"circuit":[115],"dependent.":[116]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
