{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:03:29Z","timestamp":1774541009010,"version":"3.50.1"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Des. Test"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/mdat.2020.2984224","type":"journal-article","created":{"date-parts":[[2020,3,30]],"date-time":"2020-03-30T22:06:47Z","timestamp":1585606007000},"page":"59-77","source":"Crossref","is-referenced-by-count":22,"title":["Hardware Obfuscation and Logic Locking: A Tutorial Introduction"],"prefix":"10.1109","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6845-0361","authenticated-orcid":false,"given":"Tamzidul","family":"Hoque","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3588-163X","authenticated-orcid":false,"given":"Rajat Subhra","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kharagpur"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6082-6961","authenticated-orcid":false,"given":"Swarup","family":"Bhunia","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2015.55"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2016.7857187"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/948148.948149"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516656"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858391"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744862"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2017.8353998"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2649520"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2012.11"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2729398"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224333"},{"key":"ref28","first-page":"495","article-title":"Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation","author":"imeson","year":"2013","journal-title":"Proc Usenix Secur Symp"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855559"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2808414.2808420"},{"key":"ref2","year":"0","journal-title":"How Much Has the US Lost From China&#x2019;s IP Theft?"},{"key":"ref1","year":"0","journal-title":"Semiconductor IP Market to Exceed $8 Billion by 2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176634"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2697960"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"ref24","first-page":"339","article-title":"Scan based side channel attack on dedicated hardware implementations of data encryption standard","author":"yang","year":"2004","journal-title":"Proc Int Test Conf"},{"key":"ref23","first-page":"291","article-title":"Active hardware metering for intellectual property protection and security","author":"alkabani","year":"2007","journal-title":"Proc Usenix Secur Symp"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2013.6653606"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70215"},{"key":"ref50","article-title":"The key is left under the mat","author":"rahman","year":"2020"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228377"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2584041"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0052-3"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2018.8624671"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8341985"},{"key":"ref55","first-page":"97","article-title":"SMT attack: Next generation attack on obfuscated circuits with capabilities and performance beyond the SAT attacks","volume":"2019","author":"azar","year":"2019","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062226"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2904838"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133985"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1344671.1344729"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046722"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.193"},{"key":"ref12","author":"robertson","year":"2018","journal-title":"The big hack How china used a tiny chip to infiltrate u s companies"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2399455"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2013.2247460"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134040"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI.Design.2010.54"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2459985"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CISIM.2007.51"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.284"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49019-9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49025-0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2740364"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref49","first-page":"796","article-title":"The end of logic locking? A critical view on the security of logic locking","volume":"2019","author":"engels","year":"2019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2335155"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_26"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2511144"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967014"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"293","DOI":"10.46586\/tches.v2018.i3.293-330","article-title":"On the difficulty of FSM-based hardware obfuscation","volume":"2018","author":"fyrbiak","year":"2018","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2018.8607163"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403631"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2014.6873671"},{"key":"ref44","first-page":"4","article-title":"Hidden in plaintext: An obfuscation-based countermeasure against FPGA bitstream tampering attacks","volume":"25","author":"hoque","year":"2019","journal-title":"ACM Trans Des Autom Electron Syst (TODAES)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2015.7102410"}],"container-title":["IEEE Design &amp; Test"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221038\/9123747\/09050810.pdf?arnumber=9050810","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T18:22:31Z","timestamp":1682101351000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9050810\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":62,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mdat.2020.2984224","relation":{},"ISSN":["2168-2356","2168-2364"],"issn-type":[{"value":"2168-2356","type":"print"},{"value":"2168-2364","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6]]}}}