{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:04:38Z","timestamp":1767182678259,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s41635-018-0043-4","type":"journal-article","created":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T11:40:52Z","timestamp":1536579652000},"page":"201-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["The Old Frontier of Reverse Engineering: Netlist Partitioning"],"prefix":"10.1007","volume":"2","author":[{"given":"Travis","family":"Meade","sequence":"first","affiliation":[]},{"given":"Kaveh","family":"Shamsi","sequence":"additional","affiliation":[]},{"given":"Thao","family":"Le","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Di","sequence":"additional","affiliation":[]},{"given":"Shaojie","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8791-0597","authenticated-orcid":false,"given":"Yier","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,10]]},"reference":[{"key":"43_CR1","doi-asserted-by":"crossref","unstructured":"Hicks M, Finnicum M, King ST, Martin MM, Smith JM (2010) Overcoming an untrusted computing base: detecting and removing malicious hardware automatically. In: 2010 IEEE symposium on security and privacy (SP). IEEE, pp 159\u2013172","DOI":"10.1109\/SP.2010.18"},{"key":"43_CR2","doi-asserted-by":"crossref","unstructured":"Banga M, Hsiao MS (2010) Trusted rtl: Trojan detection methodology in pre-silicon designs. In: 2010 IEEE international symposium on hardware-oriented security and trust (HOST). IEEE, pp 56\u201359","DOI":"10.1109\/HST.2010.5513114"},{"issue":"1","key":"43_CR3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/TIFS.2011.2160627","volume":"7","author":"E Love","year":"2012","unstructured":"Love E, Jin Y, Makris Y (2012) Proof-carrying hardware intellectual property: a pathway to trusted module acquisition. IEEE Trans Inf Forensics Secur 7(1):25\u201340","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Sturton C, Hicks M, Wagner D, King ST (2011) Defeating uci: building stealthy and malicious hardware. In: 2011 IEEE symposium on security and privacy (SP). IEEE, pp 64\u201377","DOI":"10.1109\/SP.2011.32"},{"key":"43_CR5","first-page":"363","volume-title":"Lecture Notes in Computer Science","author":"Randy Torrance","year":"2009","unstructured":"Torrance R, James D (2009) The state-of-the-art in ic reverse engineering. In: CHES, vol 5747. Springer, New York, pp 363\u2013381"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Torrance R, James D (2011) The state-of-the-art in semiconductor reverse engineering. In: Proceedings of the 48th design automation conference. ACM, pp 333\u2013338","DOI":"10.1145\/2024724.2024805"},{"issue":"1","key":"43_CR7","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TETC.2013.2294918","volume":"2","author":"P Subramanyan","year":"2014","unstructured":"Subramanyan P, Tsiskaridze N, Li W, Gasc\u00f3n A, Tan WY, Tiwari A, Shankar N, Seshia SA, Malik S (2014) Reverse engineering digital circuits using structural and functional analyses. IEEE Trans Emerging Topics Comput 2(1):63\u201380","journal-title":"IEEE Trans Emerging Topics Comput"},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Meade T, Zhang S, Jin Y (2016) Netlist reverse engineering for high-level functionality reconstruction. In: 2016 21st Asia and South Pacific design automation conference (ASP-DAC). IEEE, pp 655\u2013660","DOI":"10.1109\/ASPDAC.2016.7428086"},{"issue":"3","key":"43_CR9","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1155\/2000\/62159","volume":"11","author":"S Areibi","year":"2000","unstructured":"Areibi S, Vannelli A (2000) Tabu search: a meta heuristic for netlist partitioning. VLSI Design 11(3):259\u2013283","journal-title":"VLSI Design"},{"key":"43_CR10","doi-asserted-by":"crossref","unstructured":"Buntine WL, Su L, Newton AR, Mayer A (1997) Adaptive methods for netlist partitioning. In: Proceedings of the 1997 IEEE\/ACM international conference on computer-aided design. IEEE Computer Society, pp 356\u2013363","DOI":"10.1109\/ICCAD.1997.643547"},{"key":"43_CR11","doi-asserted-by":"crossref","unstructured":"Dai YY, Brayton RK (2017) Circuit recognition with deep learning","DOI":"10.1109\/HST.2017.7951826"},{"key":"43_CR12","doi-asserted-by":"crossref","unstructured":"Shi Y, Ting CW, Gwee B-H, Ren Y (2010) A highly efficient method for extracting fsms from flattened gate-level netlist. In: Proceedings of 2010 IEEE international symposium on circuits and systems (ISCAS). IEEE, pp 2610\u20132613","DOI":"10.1109\/ISCAS.2010.5537093"},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Li W, Gascon A, Subramanyan P, Tan WY, Tiwari A, Malik S, Shankar N, Seshia SA (2013) Wordrev: finding word-level structures in a sea of bit-level gates. In: 2013 IEEE international symposium on hardware-oriented security and trust (HOST). IEEE, pp 67\u201374","DOI":"10.1109\/HST.2013.6581568"},{"key":"43_CR14","doi-asserted-by":"crossref","unstructured":"Tashjian E, Davoodi A (2015) On using control signals for word-level identification in a gate-level netlist. In: Proceedings of the 52nd annual design automation conference. ACM, p 78","DOI":"10.1145\/2744769.2744878"},{"key":"43_CR15","doi-asserted-by":"crossref","unstructured":"Couch J, Reilly E, Schuyler M, Barrett B (2016) Functional block identification in circuit design recovery. In: 2016 IEEE international symposium on hardware oriented security and trust (HOST). IEEE, pp 75\u201378","DOI":"10.1109\/HST.2016.7495560"},{"issue":"3","key":"43_CR16","doi-asserted-by":"publisher","first-page":"033015","DOI":"10.1088\/1367-2630\/11\/3\/033015","volume":"11","author":"A Lancichinetti","year":"2009","unstructured":"Lancichinetti A, Fortunato S, Kert\u00e9sz J (2009) Detecting the overlapping and hierarchical community structure in complex networks. New J Phys 11(3):033015","journal-title":"New J Phys"},{"key":"43_CR17","doi-asserted-by":"crossref","unstructured":"Meade T, Jin Y, Tehranipoor M, Zhang S (2016) Gate-level netlist reverse engineering for hardware security: control logic register identification. In: 2016 IEEE international symposium on circuits and systems (ISCAS). IEEE, pp 1334\u20131337","DOI":"10.1109\/ISCAS.2016.7527495"},{"issue":"09","key":"43_CR18","doi-asserted-by":"publisher","first-page":"P09008","DOI":"10.1088\/1742-5468\/2005\/09\/P09008","volume":"2005","author":"L Danon","year":"2005","unstructured":"Danon L, Diaz-Guilera A, Duch J, Arenas A (2005) Comparing community structure identification. J Stat Mech: Theory Exp 2005(09):P09008","journal-title":"J Stat Mech: Theory Exp"},{"key":"43_CR19","doi-asserted-by":"crossref","unstructured":"Li W, Wasson Z, Seshia SA (2012) Reverse engineering circuits using behavioral pattern mining. In: 2012 IEEE international symposium on hardware-oriented security and trust, pp 83\u2013 88","DOI":"10.1109\/HST.2012.6224325"},{"key":"43_CR20","doi-asserted-by":"crossref","unstructured":"Li W, Gascon A, Subramanyan P, Tan WY, Tiwari A, Malik S, Shankar N, Seshia SA (2013) Wordrev: finding word-level structures in a sea of bit-level gates. In: 2013 IEEE international symposium on hardware-oriented security and trust (HOST), pp 67\u201374","DOI":"10.1109\/HST.2013.6581568"},{"issue":"1","key":"43_CR21","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TETC.2013.2294918","volume":"2","author":"P Subramanyan","year":"2014","unstructured":"Subramanyan P, Tsiskaridze N, Li W, Gasc\u00f3n A, Tan WY, Tiwari A, Shankar N, Seshia SA, Malik S (2014) Reverse engineering digital circuits using structural and functional analyses. IEEE Trans Emerging Topics Comput 2(1):63\u201380","journal-title":"IEEE Trans Emerging Topics Comput"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-018-0043-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0043-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0043-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T19:23:29Z","timestamp":1568057009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-018-0043-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["43"],"URL":"https:\/\/doi.org\/10.1007\/s41635-018-0043-4","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"type":"print","value":"2509-3428"},{"type":"electronic","value":"2509-3436"}],"subject":[],"published":{"date-parts":[[2018,9]]},"assertion":[{"value":"11 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}