{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:30:35Z","timestamp":1747805435309,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T00:00:00Z","timestamp":1607990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T00:00:00Z","timestamp":1607990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T00:00:00Z","timestamp":1607990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,15]]},"DOI":"10.1109\/asianhost51057.2020.9358261","type":"proceedings-article","created":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T16:25:45Z","timestamp":1614356745000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["SAT Based Partial Attack on Compound Logic Locking"],"prefix":"10.1109","author":[{"given":"Melbin","family":"John","sequence":"first","affiliation":[]},{"given":"Aadil","family":"Hoda","sequence":"additional","affiliation":[]},{"given":"Ramanuj","family":"Chouksey","sequence":"additional","affiliation":[]},{"given":"Chandan","family":"Karfa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228377"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403631"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.2968898"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2018.8368625"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060458"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951805"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060469"},{"key":"ref17","first-page":"936","article-title":"Functional analysis attacks on logic locking","author":"sirone","year":"2019","journal-title":"In DATE"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02777-2_24"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942134"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060492"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8741028"},{"key":"ref6","article-title":"Is Register Transfer Level (RTL) Locking Secure?","author":"karfa","year":"2020","journal-title":"In DATE"},{"journal-title":"CSAW Logic Locking Contuest","year":"2019","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2404876"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2017.8046226"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.24"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176634"},{"key":"ref1","first-page":"97","article-title":"SMT attack: Next generation attack on obfuscated circuits with capabilities and performance beyond the SAT attacks","author":"azar","year":"2019","journal-title":"IACR TCHES"},{"key":"ref20","first-page":"189","article-title":"Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks","author":"xiaolin","year":"2017","journal-title":"CHES '17"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495588"},{"key":"ref21","first-page":"199","article-title":"Anti-sat: Mitigating sat attack on logic locking","author":"xie","year":"2018","journal-title":"IEEE TCAD"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2511144"},{"key":"ref23","first-page":"1","article-title":"Removal attacks on logic locking and camouflaging techniques","author":"yasin","year":"2019","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133985"},{"key":"ref25","first-page":"1411","article-title":"On improving the security of logic locking","volume":"35","author":"yasin","year":"2015","journal-title":"IEEE TCAD"}],"event":{"name":"2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","start":{"date-parts":[[2020,12,15]]},"location":"Kolkata, India","end":{"date-parts":[[2020,12,17]]}},"container-title":["2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9358237\/9358248\/09358261.pdf?arnumber=9358261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T12:06:42Z","timestamp":1656331602000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9358261\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,15]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/asianhost51057.2020.9358261","relation":{},"subject":[],"published":{"date-parts":[[2020,12,15]]}}}