{"id":"https://openalex.org/W4406370361","doi":"https://doi.org/10.3390/cryptography9010006","title":"Protecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo-Random Number Generation","display_name":"Protecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo-Random Number Generation","publication_year":2025,"publication_date":"2025-01-14","ids":{"openalex":"https://openalex.org/W4406370361","doi":"https://doi.org/10.3390/cryptography9010006"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography9010006","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9010006","pdf_url":"https://www.mdpi.com/2410-387X/9/1/6/pdf?version=1736845921","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/9/1/6/pdf?version=1736845921","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062304833","display_name":"J. Z. Wu","orcid":"https://orcid.org/0009-0005-2033-8433"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jiaming Wu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040726498","display_name":"Olivia P. Dizon-Paradis","orcid":"https://orcid.org/0000-0002-6879-8624"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Olivia Dizon-Paradis","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102401112","display_name":"Sazadur Rahman","orcid":null},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sazadur Rahman","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL 32816, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL 32816, USA","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055751228","display_name":"Damon L. Woodard","orcid":"https://orcid.org/0000-0002-0471-177X"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Damon L. Woodard","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009243659","display_name":"Domenic Forte","orcid":"https://orcid.org/0000-0002-2794-7320"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Domenic Forte","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5062304833"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":4.5405,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.91757095,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"9","issue":"1","first_page":"6","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scan-chain","display_name":"Scan chain","score":0.8056827783584595},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7998360395431519},{"id":"https://openalex.org/keywords/satisfiability-modulo-theories","display_name":"Satisfiability modulo theories","score":0.6304447650909424},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5364447832107544},{"id":"https://openalex.org/keywords/testability","display_name":"Testability","score":0.5248147249221802},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.4745826721191406},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.4588528275489807},{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.4341747462749481},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4264235496520996},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.377142071723938},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.36301881074905396},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3576117753982544},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.31032055616378784},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15696817636489868},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.1554488241672516},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12882345914840698}],"concepts":[{"id":"https://openalex.org/C150012182","wikidata":"https://www.wikidata.org/wiki/Q225990","display_name":"Scan chain","level":3,"score":0.8056827783584595},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7998360395431519},{"id":"https://openalex.org/C164155591","wikidata":"https://www.wikidata.org/wiki/Q2067766","display_name":"Satisfiability modulo theories","level":2,"score":0.6304447650909424},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5364447832107544},{"id":"https://openalex.org/C51234621","wikidata":"https://www.wikidata.org/wiki/Q2149495","display_name":"Testability","level":2,"score":0.5248147249221802},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.4745826721191406},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.4588528275489807},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.4341747462749481},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4264235496520996},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.377142071723938},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.36301881074905396},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3576117753982544},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.31032055616378784},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15696817636489868},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.1554488241672516},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12882345914840698},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography9010006","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9010006","pdf_url":"https://www.mdpi.com/2410-387X/9/1/6/pdf?version=1736845921","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b1c737e6722d4a60862832e5c332ab86","is_oa":true,"landing_page_url":"https://doaj.org/article/b1c737e6722d4a60862832e5c332ab86","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 9, Iss 1, p 6 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography9010006","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9010006","pdf_url":"https://www.mdpi.com/2410-387X/9/1/6/pdf?version=1736845921","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1815913731","display_name":null,"funder_award_id":"2016624","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4406370361.pdf","grobid_xml":"https://content.openalex.org/works/W4406370361.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W1475025077","https://openalex.org/W1484146606","https://openalex.org/W1524250393","https://openalex.org/W1561363170","https://openalex.org/W1873576501","https://openalex.org/W1931458304","https://openalex.org/W1971378428","https://openalex.org/W2010452589","https://openalex.org/W2010903499","https://openalex.org/W2063530357","https://openalex.org/W2128687423","https://openalex.org/W2141624968","https://openalex.org/W2142537526","https://openalex.org/W2484879158","https://openalex.org/W2524064595","https://openalex.org/W2616454726","https://openalex.org/W2913488618","https://openalex.org/W2964266055","https://openalex.org/W2972308582","https://openalex.org/W3008093014","https://openalex.org/W3036662531","https://openalex.org/W3040839314","https://openalex.org/W3086687520","https://openalex.org/W3209004752","https://openalex.org/W3214859170","https://openalex.org/W4236509984","https://openalex.org/W4318037433","https://openalex.org/W4320025022","https://openalex.org/W4364321031","https://openalex.org/W4385831939","https://openalex.org/W4386426879","https://openalex.org/W4389352563","https://openalex.org/W4392061623","https://openalex.org/W4399396330","https://openalex.org/W6697267999"],"related_works":["https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W2766647240","https://openalex.org/W4405231858","https://openalex.org/W3178565067","https://openalex.org/W4285410106","https://openalex.org/W3161338937","https://openalex.org/W2765347974","https://openalex.org/W3110853414","https://openalex.org/W3207843684"],"abstract_inverted_index":{"Design-for-test/debug":[0],"(DfT/D)":[1],"introduces":[2],"scan":[3,14,18,36,88],"chain":[4,37],"testing":[5],"to":[6,23,41,63,79,97,109,141,172,182,230,237],"increase":[7,183],"testability":[8],"and":[9,52,69,91,160,164,190,215,222,233],"fault":[10],"coverage":[11],"by":[12,48],"inserting":[13],"flip-flops.":[15],"However,":[16],"these":[17],"chains":[19],"are":[20],"also":[21],"known":[22],"be":[24],"a":[25,80,113,169,176,204],"liability":[26],"for":[27,218],"security":[28],"primitives.":[29],"In":[30,54],"previous":[31],"research,":[32],"the":[33,75,99,127,184,228],"dynamically":[34],"obfuscated":[35],"(DOSC)":[38],"was":[39],"introduced":[40],"protect":[42],"logic-locking":[43],"keys":[44],"from":[45],"scan-based":[46,240],"attacks":[47],"obscuring":[49],"test":[50],"patterns":[51,140],"responses.":[53],"this":[55],"paper,":[56],"we":[57,167],"present":[58],"DOSCrack,":[59],"an":[60,193],"oracle-guided":[61],"attack":[62],"de-obfuscate":[64],"DOSC":[65,158],"using":[66],"symbolic":[67,84,187],"execution":[68,85,188],"binary":[70],"clustering,":[71],"which":[72,134,174],"significantly":[73],"reduces":[74],"candidate":[76],"seed":[77,101],"space":[78],"manageable":[81],"quantity.":[82],"Our":[83,200,225],"engine":[86],"employs":[87],"mode":[89],"simulation":[90,139],"satisfiability":[92],"modulo":[93],"theories":[94],"(SMT)":[95],"solvers":[96],"reduce":[98],"possible":[100],"space,":[102],"while":[103],"obfuscation":[104,145,209],"key":[105],"clustering":[106],"allows":[107],"us":[108],"effectively":[110,202],"rule":[111],"out":[112],"group":[114],"of":[115,123,129,157,186],"seeds":[116],"that":[117],"share":[118],"similarities.":[119],"An":[120],"integral":[121],"component":[122],"our":[124,150,197],"approach":[125],"is":[126],"use":[128],"sequential":[130],"equivalence":[131],"checking":[132],"(SEC),":[133],"aids":[135],"in":[136,207],"identifying":[137],"distinct":[138],"differentiate":[142],"between":[143],"potential":[144],"keys.":[146],"We":[147],"experimentally":[148],"applied":[149],"DOSCrack":[151,173,198],"framework":[152,226],"on":[153],"four":[154],"different":[155],"sizes":[156],"benchmarks":[159],"compared":[161],"their":[162],"runtime":[163],"complexity.":[165],"Finally,":[166],"propose":[168],"low-cost":[170],"countermeasure":[171],"incorporates":[175],"nonlinear":[177],"feedback":[178],"shift":[179],"register":[180],"(NLFSR)":[181],"effort":[185],"modeling":[189],"serves":[191],"as":[192],"effective":[194],"defense":[195,235],"against":[196],"framework.":[199],"research":[201,221],"addresses":[203],"critical":[205],"vulnerability":[206],"scan-chain":[208],"methodologies,":[210],"offering":[211],"insights":[212],"into":[213],"DfT/D":[214],"logic":[216],"locking":[217],"both":[219],"academic":[220],"industrial":[223],"applications.":[224],"highlights":[227],"need":[229],"craft":[231],"robust":[232],"adaptable":[234],"mechanisms":[236],"counter":[238],"evolving":[239],"attacks.":[241]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
