{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T04:07:17Z","timestamp":1747886837435,"version":"3.41.0"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/tcad.2023.3248512","type":"journal-article","created":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T18:44:46Z","timestamp":1677177886000},"page":"2067-2079","source":"Crossref","is-referenced-by-count":0,"title":["Scaling Attacks on Large Logic-Locked Designs"],"prefix":"10.1109","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6715-267X","authenticated-orcid":false,"given":"Abdul","family":"Khader Thalakkattu Moosa","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, New York University, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7642-3638","authenticated-orcid":false,"given":"Benjamin","family":"Tan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Software Engineering, University of Calgary, Calgary, AB, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7989-5617","authenticated-orcid":false,"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, New York University, New York, NY, USA"}]}],"member":"263","reference":[{"issue":"8","key":"ref1","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1109\/JPROC.2014.2335155","article-title":"A primer on hardware security: Models, methods, and metrics","volume":"102","author":"Rostami","year":"2014","journal-title":"Proc. IEEE"},{"issue":"7","key":"ref2","doi-asserted-by":"crossref","first-page":"1306","DOI":"10.1109\/TVLSI.2021.3074004","article-title":"ASSURE: RTL locking against an untrusted foundry","volume":"29","author":"Pilato","year":"2021","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/DATE.2008.4484823"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/HST.2016.7495588"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TCAD.2018.2801220"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TIFS.2019.2904838"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/3060403.3060458"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/HST.2015.7140252"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.23919\/DATE.2019.8715163"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICCAD45719.2019.8942049"},{"key":"ref11","article-title":"Benchmarking at the frontier of hardware security: Lessons from logic locking","author":"Tan","year":"2020","journal-title":"arXiv:2006.06806"},{"volume-title":"Common evaluation platform.","year":"2020","key":"ref12"},{"key":"ref13","first-page":"1105","article-title":"OpenROAD: Toward a self-driving, open-source digital layout implementation tool chain","volume-title":"Proc. Government Microcircuit Appl. Critical Technol. Conf.","author":"Ajayi"},{"key":"ref14","first-page":"534","article-title":"KC2: Key-condition crunching for fast sequential circuit deobfuscation","volume-title":"Proc. Design, Autom. Test Europe Conf. Exhibit. (DATE)","author":"Shamsi"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TCAD.2015.2511144"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/HST.2017.7951805"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ISVLSI.2018.00080"},{"key":"ref18","first-page":"1","article-title":"Full-lock: Hard distributions of SAT instances for obfuscating circuits using fully configurable logic and routing blocks","volume-title":"Proc. 56th ACM\/IEEE Design Autom. Conf. (DAC)","author":"Kamali"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/DAC18072.2020.9218600"},{"key":"ref20","first-page":"1","article-title":"NNgSAT: Neural network guided SAT attack on logic locked complex structures","volume-title":"Proc. IEEE\/ACM Int. Conf. Comput. Aided Design (ICCAD)","author":"Azar"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.23919\/DATE48585.2020.9116261"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/AsianHOST51057.2020.9358261"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/HOST45689.2020.9300272"},{"volume-title":"CAD for assurance: NEOS: Netlist encryption and obfuscation suite.","author":"Shamsi","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1142\/S0218213018400018"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/3287624.3287670"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/54.785838"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/82.204129"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/DAC18074.2021.9586314"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TETC.2017.2740364"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.23919\/DATE.2018.8342086"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/11007940\/10050523.pdf?arnumber=10050523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:07:45Z","timestamp":1747804065000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10050523\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":31,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2023.3248512","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"type":"print","value":"0278-0070"},{"type":"electronic","value":"1937-4151"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}