{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:35:02Z","timestamp":1743024902215,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811905414"},{"type":"electronic","value":"9789811905421"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-0542-1_3","type":"book-chapter","created":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T05:02:47Z","timestamp":1651035767000},"page":"27-41","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Revisiting Logic Obfuscation Using Cellular Automata"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2060-2773","authenticated-orcid":false,"given":"Akashdeep","family":"Saha","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9185-1438","authenticated-orcid":false,"given":"Hrivu","family":"Banerjee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3588-163X","authenticated-orcid":false,"given":"Rajat Subhra","family":"Chakraborty","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6499-8346","authenticated-orcid":false,"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,28]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Yasin, M., Sengupta, A., Nabeel, M. T., Ashraf, M., Rajendran, J., Sinanoglu, O.: Provably-secure logic locking: from theory to practice. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1601\u20131618 (2017)","DOI":"10.1145\/3133956.3133985"},{"issue":"10","key":"3_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2010.284","volume":"43","author":"JA Roy","year":"2010","unstructured":"Roy, J.A., Koushanfar, F., Markov, I.L.: Ending piracy of integrated circuits. Computer 43(10), 30\u201338 (2010)","journal-title":"Computer"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Yasin, M., Mazumdar, B., Rajendran, J.J., Sinanoglu, O.: TTLock: Tenacious and traceless logic locking. In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), p. 166. IEEE Computer Society (2017)","DOI":"10.1109\/HST.2017.7951830"},{"key":"3_CR4","unstructured":"Alkabani, Y., Koushanfar, F.: Active hardware metering for intellectual property protection and security. In: USENIX Security Symposium, pp. 291\u2013306 (2007)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Kahng, A.B., Lach, J., Mangione-Smith, W.H., Mantik, S., Markov, I.L., Potkonjak, M., ... & Wolfe, G.: Watermarking techniques for intellectual property protection. In: Proceedings of the 35th Annual Design Automation Conference, pp. 776\u2013781 (1998)","DOI":"10.1145\/277044.277240"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Rajendran, J., Sam, M., Sinanoglu, O., Karri, R.: Security analysis of integrated circuit camouflaging. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 709\u2013720 (2013)","DOI":"10.1145\/2508859.2516656"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Subramanyan, P., Ray, S., Malik, S.: Evaluating the security of logic encryption algorithms. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 137\u2013143. IEEE (2015)","DOI":"10.1109\/HST.2015.7140252"},{"issue":"2","key":"3_CR8","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/TCAD.2018.2801220","volume":"38","author":"Y Xie","year":"2018","unstructured":"Xie, Y., Srivastava, A.: Anti-sat: mitigating sat attack on logic locking. IEEE Trans. Comput.-Aided Des. Integr. Circ. Syst. 38(2), 199\u2013207 (2018)","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circ. Syst."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Yasin, M., Mazumdar, B., Rajendran, J. J., Sinanoglu, O. SARLock: SAT attack resistant logic locking. In: 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 236\u2013241. IEEE (2016)","DOI":"10.1109\/HST.2016.7495588"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Saha, A., Saha, S., Chowdhury, S., Mukhopadhyay, D., Bhattacharya, B.B.: LoPher: SAT-hardened logic embedding on block ciphers. In: 2020 57th ACM\/IEEE Design Automation Conference (DAC), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/DAC18072.2020.9218600"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Kamali, H. M., Azar, K. Z., Homayoun, H., Sasan, A.: Full-lock: Hard distributions of sat instances for obfuscating circuits using fully configurable logic and routing blocks. In: Proceedings of the 56th Annual Design Automation Conference, pp. 1\u20136 (2019)","DOI":"10.1145\/3316781.3317831"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Xu, X., Shakya, B., Tehranipoor, M.M., & Forte, D.: Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks. In: 2017 International Conference on Cryptographic Hardware and Embedded Systems, pp. 189\u2013210. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-66787-4_10"},{"issue":"2","key":"3_CR13","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1109\/TETC.2017.2740364","volume":"8","author":"M Yasin","year":"2017","unstructured":"Yasin, M., Mazumdar, B., Sinanoglu, O., Rajendran, J.: Removal attacks on logic locking and camouflaging techniques. IEEE Trans. Emerg. Top. Comput. 8(2), 517\u2013532 (2017)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"2514","DOI":"10.1109\/TIFS.2020.2968183","volume":"15","author":"D Sirone","year":"2020","unstructured":"Sirone, D., Subramanyan, P.: Functional analysis attacks on logic locking. IEEE Trans. Inform. Forensics Sec. 15, 2514\u20132527 (2020)","journal-title":"IEEE Trans. Inform. Forensics Sec."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Meade, T., Zhao, Z., Zhang, S., Pan, D., Jin, Y.: Revisit sequential logic obfuscation: attacks and defenses. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1\u20134. IEEE (2017)","DOI":"10.1109\/ISCAS.2017.8050606"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Fyrbiak, M., Wallat, S., D\u00e9chelotte, J., Albartus, N., B\u00f6cker, S., Tessier, R., Paar, C.: On the difficulty of FSM-based hardware obfuscation. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 293\u2013330 (2018)","DOI":"10.46586\/tches.v2018.i3.293-330"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Karmakar, R., Jana, S.S., Chattopadhyay, S.: A cellular automata guided obfuscation strategy for finite-state-machine synthesis. In: 2019 56th ACM\/IEEE Design Automation Conference (DAC), pp. 1\u20136. IEEE (2019)","DOI":"10.1145\/3316781.3317738"},{"key":"3_CR18","unstructured":"Chaudhuri, P.P., Chowdhury, D.R., Nandi, S., Chattopadhyay, S.: Additive Cellular Automata: Theory and Applications, vol. 43. Wiley (1997)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Saha, A., Banerjee, H., Chakraborty, R.S., Mukhopadhyay, D.: ORACALL: an oracle-based attack on cellular automata guided logic locking. IEEE Trans. Comput.-Aided Des. Integr. Circ. Syst. (2021)","DOI":"10.1109\/TCAD.2021.3050035"},{"key":"3_CR20","unstructured":"Mukhopadhyay, D.: Design and analysis of cellular automata based cryptographic algorithms (2007). https:\/\/cse.iitkgp.ac.in\/~debdeep\/research\/thesis.pdf"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 450\u2013466. Springer (2007)","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Ghoshal, A., Sadhukhan, R., Patranabis, S., Datta, N., Picek, S., Mukhopadhyay, D.: Lightweight and side-channel secure 4$$\\times $$4 s-boxes from cellular automata rules. In: IACR Transactions on Symmetric Cryptology, pp. 311\u2013334 (2018)","DOI":"10.46586\/tosc.v2018.i3.311-334"},{"key":"3_CR23","unstructured":"Berkeley Logic Synthesis and Verification Group: ABC: a system for sequential synthesis and verification, release 10216 (2018). http:\/\/www.eecs.berkeley.edu\/~alanmi\/abc\/"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of First Asian Symposium on Cellular Automata Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-0542-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T05:03:39Z","timestamp":1651035819000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-0542-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811905414","9789811905421"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-0542-1_3","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"28 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASCAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Symposium on Cellular Automata Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 March 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ascat2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}