{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T22:13:39Z","timestamp":1769033619119,"version":"3.49.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T00:00:00Z","timestamp":1687219200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T00:00:00Z","timestamp":1687219200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,20]]},"DOI":"10.1109\/isvlsi59464.2023.10238540","type":"proceedings-article","created":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T13:23:19Z","timestamp":1694006599000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Reverse Engineering of RTL Controllers from Look-Up Table Netlists"],"prefix":"10.1109","author":[{"given":"Sundarakumar","family":"Muthukumaran","sequence":"first","affiliation":[{"name":"University of Cincinnati,Digital Design Environments Lab,ECE Department,Cincinnati,Ohio,USA"}]},{"given":"Aparajithan","family":"Nathamuni Venkatesan","sequence":"additional","affiliation":[{"name":"University of Cincinnati,Digital Design Environments Lab,ECE Department,Cincinnati,Ohio,USA"}]},{"given":"Kishore","family":"Pula","sequence":"additional","affiliation":[{"name":"University of Cincinnati,Digital Design Environments Lab,ECE Department,Cincinnati,Ohio,USA"}]},{"given":"Ram Venkat","family":"Narayanan","sequence":"additional","affiliation":[{"name":"University of Cincinnati,Digital Design Environments Lab,ECE Department,Cincinnati,Ohio,USA"}]},{"given":"Ranga","family":"Vemuri","sequence":"additional","affiliation":[{"name":"University of Cincinnati,Digital Design Environments Lab,ECE Department,Cincinnati,Ohio,USA"}]},{"given":"John","family":"Emmert","sequence":"additional","affiliation":[{"name":"University of Cincinnati,Digital Design Environments Lab,ECE Department,Cincinnati,Ohio,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-021-00268-5"},{"key":"ref2","volume-title":"Project X-Ray"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2012.6339165"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3329081"},{"key":"ref5","first-page":"30","article-title":"Vivado design suite","volume":"5","author":"Feist","year":"2012","journal-title":"White Paper"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537093"},{"key":"ref7","volume-title":"Methods and apparatuses for automatic extraction of finite state machines","author":"McElvain","year":"2001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218616"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8740844"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/iccad51958.2021.9643498"},{"key":"ref11","article-title":"On the difficulty of fsm-based hardware obfuscation","author":"Fyrbiak","year":"2019","journal-title":"Cryptology ePrint Archive, Paper 2019\/1163"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323419"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1109\/ISQED57927.2023.10129373","volume-title":"Reverse engineering word-level models from look-up table netlists","author":"Narayanan","year":"2023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID57277.2023.00083"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/0201010"},{"key":"ref16","volume-title":"Networkx: Network analysis with Python","author":"Hagberg","year":"2020"},{"key":"ref17","first-page":"1695","article-title":"The igraph software package for complex network research","volume-title":"InterJournal","volume":"Complex Systems","author":"Csardi","year":"2006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.1999.805857"},{"key":"ref19","volume-title":"The reference community for Free and Open Source gateware IP cores"},{"key":"ref20","volume-title":"secworks"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9657.001.0001"}],"event":{"name":"2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","location":"Foz do Iguacu, Brazil","start":{"date-parts":[[2023,6,20]]},"end":{"date-parts":[[2023,6,23]]}},"container-title":["2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10238464\/10238482\/10238540.pdf?arnumber=10238540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T07:22:09Z","timestamp":1768980129000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10238540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,20]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/isvlsi59464.2023.10238540","relation":{},"subject":[],"published":{"date-parts":[[2023,6,20]]}}}