{"id":"https://openalex.org/W7143293484","doi":"https://doi.org/10.48550/arxiv.2603.25904","title":"Disguising Topology and Side-Channel Information through Covert Gate- and ML-Enabled IP Camouflaging","display_name":"Disguising Topology and Side-Channel Information through Covert Gate- and ML-Enabled IP Camouflaging","publication_year":2026,"publication_date":"2026-03-26","ids":{"openalex":"https://openalex.org/W7143293484","doi":"https://doi.org/10.48550/arxiv.2603.25904"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.25904","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.25904","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.25904","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130957229","display_name":"Junling Fan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Fan, Junling","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073961867","display_name":"David S. Koblah","orcid":"https://orcid.org/0000-0002-5208-9874"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Koblah, David","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5009243659","display_name":"Domenic Forte","orcid":"https://orcid.org/0000-0002-2794-7320"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Forte, Domenic","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5130957229"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9162999987602234,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9162999987602234,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.04569999873638153,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.007600000128149986,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.7075999975204468},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.5817999839782715},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5383999943733215},{"id":"https://openalex.org/keywords/forcing","display_name":"Forcing (mathematics)","score":0.5120000243186951},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5074999928474426},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.4846000075340271},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.48010000586509705},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.47850000858306885},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4742000102996826},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.4593000113964081}],"concepts":[{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.7075999975204468},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7056999802589417},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.5817999839782715},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5383999943733215},{"id":"https://openalex.org/C197115733","wikidata":"https://www.wikidata.org/wiki/Q1003136","display_name":"Forcing (mathematics)","level":2,"score":0.5120000243186951},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5074999928474426},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.4846000075340271},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.48010000586509705},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.47850000858306885},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4742000102996826},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.4593000113964081},{"id":"https://openalex.org/C2777062904","wikidata":"https://www.wikidata.org/wiki/Q545406","display_name":"Toolchain","level":3,"score":0.45010000467300415},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4341000020503998},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.40389999747276306},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.39640000462532043},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3910999894142151},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.38609999418258667},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.36329999566078186},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.3605000078678131},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3587999939918518},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.3352999985218048},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.32190001010894775},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.31679999828338623},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.3098999857902527},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.30869999527931213},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.30480000376701355},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.299699991941452},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.29600000381469727},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.2948000133037567},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.29120001196861267},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2879999876022339},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.28619998693466187},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.28450000286102295},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.2831999957561493},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.2766999900341034},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2671999931335449},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.26420000195503235},{"id":"https://openalex.org/C2984118289","wikidata":"https://www.wikidata.org/wiki/Q29954","display_name":"Power consumption","level":3,"score":0.26159998774528503},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2590000033378601},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.2556999921798706}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.25904","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.25904","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.25904","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.25904","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6172075867652893}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Semiconductor":[0],"intellectual":[1],"property":[2],"(IP)":[3],"theft":[4],"incurs":[5],"hundreds":[6],"of":[7,67,106],"billions":[8],"in":[9],"annual":[10],"losses,":[11],"driven":[12],"by":[13,102,138],"advanced":[14],"reverse":[15],"engineering":[16],"(RE)":[17],"techniques.":[18],"Traditional":[19],"``cryptic''":[20],"IC":[21],"camouflaging":[22],"methods":[23],"typically":[24],"focus":[25],"on":[26],"hiding":[27],"localized":[28],"gate":[29],"functionality":[30],"but":[31],"remain":[32],"vulnerable":[33],"to":[34,50,113,123],"system-level":[35],"structural":[36,141],"analysis.":[37],"This":[38],"paper":[39],"explores":[40],"``mimetic":[41],"deception,''":[42],"where":[43],"a":[44,56,64,98],"functional":[45],"IP":[46,60,71],"(F)":[47],"is":[48,111],"designed":[49],"structurally":[51],"and":[52,75,86,142],"visually":[53],"masquerade":[54],"as":[55],"completely":[57],"different":[58],"appearance":[59],"(A).":[61],"We":[62],"provide":[63],"comprehensive":[65],"evaluation":[66],"three":[68],"deceptive":[69],"methodologies:":[70],"Camouflage,":[72],"Graph":[73],"Matching,":[74],"DNAS-NAND":[76],"Gate":[77],"Array,":[78],"analyzing":[79],"their":[80],"resilience":[81],"against":[82],"GNN-based":[83],"node":[84],"classification,":[85],"Differential":[87],"Power":[88],"Analysis":[89],"(DPA).":[90],"Crucially,":[91],"we":[92],"demonstrate":[93],"that":[94,128],"mimetic":[95],"deception":[96],"achieves":[97],"novel":[99],"anti-side-channel":[100],"defense:":[101],"forcing":[103],"the":[104,109,120,134,140],"mis-classification":[105],"cryptographic":[107],"primitives,":[108],"adversary":[110],"led":[112],"apply":[114],"an":[115],"incorrect":[116],"power":[117],"model,":[118],"causing":[119],"DPA":[121],"attack":[122],"fail.":[124],"Our":[125],"results":[126],"validate":[127],"this":[129],"multi-layered":[130],"approach":[131],"effectively":[132],"thwarts":[133],"entire":[135],"RE":[136],"toolchain":[137],"poisoning":[139],"logical":[143],"data":[144],"used":[145],"for":[146],"netlist":[147],"understanding.":[148]},"counts_by_year":[],"updated_date":"2026-03-31T06:07:48.031334","created_date":"2026-03-31T00:00:00"}
