{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:08:43Z","timestamp":1774631323281,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004919","name":"King Abdulaziz City for Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004919","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,7]]},"DOI":"10.1109\/isqed51717.2021.9424348","type":"proceedings-article","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T00:09:51Z","timestamp":1620691791000},"page":"381-386","source":"Crossref","is-referenced-by-count":1,"title":["SOMA: Security Evaluation of Obfuscation Methods via Attack Sequencing"],"prefix":"10.1109","author":[{"given":"Abdulrahman","family":"Alaql","sequence":"first","affiliation":[]},{"given":"Xinmu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Md Moshiur","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Swarup","family":"Bhunia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951805"},{"key":"ref11","article-title":"Removal attacks on logic locking and camouflaging techniques","author":"yasin","year":"2017","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"ref12","first-page":"189","article-title":"Novel bypass attack and bdd-based tradeoff analysis against all known logic locking attacks","author":"xu","year":"2017","journal-title":"International Conference on Cryptographic Hardware and Embedded Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2511144"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2404876"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST47458.2019.9006720"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2018.8607163"},{"key":"ref17","author":"brglez","year":"1985","journal-title":"A neutral netlist of 10 combinational circuits and a target translator in fortran"},{"key":"ref18","author":"yang","year":"1988","journal-title":"Logic synthesis and optimization benchmarks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2015.7102410"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317831"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3194554.3194580"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2019.8758637"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133985"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687424"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2014.6873671"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23218"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403631"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref20","first-page":"459","article-title":"Hard and easy distributions of sat problems","volume":"92","author":"mitchell","year":"1992","journal-title":"AAAI"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495588"}],"event":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","location":"Santa Clara, CA, USA","start":{"date-parts":[[2021,4,7]]},"end":{"date-parts":[[2021,4,9]]}},"container-title":["2021 22nd International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424228\/9424248\/09424348.pdf?arnumber=9424348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:41:23Z","timestamp":1652197283000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9424348\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isqed51717.2021.9424348","relation":{},"subject":[],"published":{"date-parts":[[2021,4,7]]}}}