{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:37:39Z","timestamp":1753922259675,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T00:00:00Z","timestamp":1548028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","award":["2016-TS-2688,2016-TS-2689"],"award-info":[{"award-number":["2016-TS-2688,2016-TS-2689"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1618824,CNS-1618797"],"award-info":[{"award-number":["CNS-1618824,CNS-1618797"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,21]]},"DOI":"10.1145\/3287624.3287698","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T21:45:18Z","timestamp":1547847918000},"page":"45-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Layout recognition attacks on split manufacturing"],"prefix":"10.1145","author":[{"given":"Wenbin","family":"Xu","sequence":"first","affiliation":[{"name":"Texas A&amp;M University"}]},{"given":"Lang","family":"Feng","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University"}]},{"given":"Jeyavijayan (JV)","family":"Rajendran","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University"}]},{"given":"Jiang","family":"Hu","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University"}]}],"member":"320","published-online":{"date-parts":[[2019,1,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Interconnections: Split Manufacturing in RF Designs. MDPI Electronics","author":"Bi Y.","year":"2015","unstructured":"Y. Bi , J. Yuan , and Y. Jin . 2015 . Beyond the Interconnections: Split Manufacturing in RF Designs. MDPI Electronics (2015), 541--564. Y. Bi, J. Yuan, and Y. Jin. 2015. Beyond the Interconnections: Split Manufacturing in RF Designs. MDPI Electronics (2015), 541--564."},{"key":"e_1_3_2_1_2_1","volume-title":"IEEE International On-Line Testing Symposium","author":"Dupuis S.","year":"2014","unstructured":"S. Dupuis , P. S. Ba , G. Di Natale , M. L. Flottes , and B. Rouzeyre . 2014. A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans . IEEE International On-Line Testing Symposium ( 2014 ), 49--54. S. Dupuis, P. S. Ba, G. Di Natale, M. L. Flottes, and B. Rouzeyre. 2014. A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans. IEEE International On-Line Testing Symposium (2014), 49--54."},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Conference on Security","author":"Imeson F.","year":"2013","unstructured":"F. Imeson , A. Emtenan , S. Garg , and M. V. Tripunitara . 2013. Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation . USENIX Conference on Security ( 2013 ), 495--510. F. Imeson, A. Emtenan, S. Garg, and M. V. Tripunitara. 2013. Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation. USENIX Conference on Security (2013), 495--510."},{"key":"e_1_3_2_1_4_1","unstructured":"Intelligence Advanced Research Projects Activity. 2011. Trusted Integrated Circuits Program. https:\/\/www.fbo.gov\/utils\/view?id=b8be3d2c5d5babbdffc6975c370247a6.  Intelligence Advanced Research Projects Activity. 2011. Trusted Integrated Circuits Program. https:\/\/www.fbo.gov\/utils\/view?id=b8be3d2c5d5babbdffc6975c370247a6."},{"key":"e_1_3_2_1_5_1","unstructured":"iSAT3. 2014. https:\/\/projects.avacs.org\/projects\/isat3.  iSAT3. 2014. https:\/\/projects.avacs.org\/projects\/isat3."},{"key":"e_1_3_2_1_6_1","volume-title":"Split manufacturing method for advanced semiconductor circuits. US Patent no. 7195931","author":"Jarvis R. W.","year":"2004","unstructured":"R. W. Jarvis and M. G. McIntyre . 2004. Split manufacturing method for advanced semiconductor circuits. US Patent no. 7195931 ( 2004 ). R. W. Jarvis and M. G. McIntyre. 2004. Split manufacturing method for advanced semiconductor circuits. US Patent no. 7195931 (2004)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"M. Li B. Yu Y. Lin X. Xu W. Li and D. Z. Pan. 2018. A practical split manufacturing framework for trojan prevention via simultaneous wire lifting and cell insertion. ASPDAC (2018) 265--270.   M. Li B. Yu Y. Lin X. Xu W. Li and D. Z. Pan. 2018. A practical split manufacturing framework for trojan prevention via simultaneous wire lifting and cell insertion. ASPDAC (2018) 265--270.","DOI":"10.1109\/ASPDAC.2018.8297316"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"J. Maga\u00c3\u015ba D. Shi J. Melchert and A. Davoodi. 2017. Are Proximity Attacks a Threat to the Security of Split Manufacturing of Integrated Circuits? TVLSI (2017) 3406--3419.  J. Maga\u00c3\u015ba D. Shi J. Melchert and A. Davoodi. 2017. Are Proximity Attacks a Threat to the Security of Split Manufacturing of Integrated Circuits? TVLSI (2017) 3406--3419.","DOI":"10.1109\/TVLSI.2017.2748018"},{"key":"e_1_3_2_1_9_1","unstructured":"S. Mitra H.-S.P. Wong and S. Wong. 2015. Stopping Hardware Trojans in Their Tracks. http:\/\/spectrum.ieee.org\/semiconductors\/design\/stopping-hardware-trojans-in-their-tracks.  S. Mitra H.-S.P. Wong and S. Wong. 2015. Stopping Hardware Trojans in Their Tracks. http:\/\/spectrum.ieee.org\/semiconductors\/design\/stopping-hardware-trojans-in-their-tracks."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"C.T.O. Otero J. Tse R. Karmazin B. Hill and R. Manohar. 2015. Automatic obfuscated cell layout for trusted split-foundry design. HOST (2015) 56--61.  C.T.O. Otero J. Tse R. Karmazin B. Hill and R. Manohar. 2015. Automatic obfuscated cell layout for trusted split-foundry design. HOST (2015) 56--61.","DOI":"10.1109\/HST.2015.7140237"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"S. Patnaik J. Knechtel M. Ashraf and O. Sinanoglu. 2018. Concerted wire lifting: Enabling secure and cost-effective split manufacturing. ASPDAC (2018) 251--258.   S. Patnaik J. Knechtel M. Ashraf and O. Sinanoglu. 2018. Concerted wire lifting: Enabling secure and cost-effective split manufacturing. ASPDAC (2018) 251--258.","DOI":"10.1109\/ASPDAC.2018.8297314"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"J. Rajendran O. Sinanoglu and R. Karri. 2013. Is split manufacturing secure? DATE (2013) 1259--1264.   J. Rajendran O. Sinanoglu and R. Karri. 2013. Is split manufacturing secure? DATE (2013) 1259--1264.","DOI":"10.7873\/DATE.2013.261"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"A. Sengupta S. Patnaik J. Knechtel M. Ashraf S. Garg and O. Sinanoglu. 2017. Rethinking split manufacturing: An information-theoretic approach with secure layout techniques. ICCAD (2017) 329--326.   A. Sengupta S. Patnaik J. Knechtel M. Ashraf S. Garg and O. Sinanoglu. 2017. Rethinking split manufacturing: An information-theoretic approach with secure layout techniques. ICCAD (2017) 329--326.","DOI":"10.1109\/ICCAD.2017.8203796"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"K. Vaidyanathan B. P Das E. Sumbul R. Liu and L. Pileggi. 2014. Building Trusted ICs using Split Fabrication. HOST (2014) 1--6.  K. Vaidyanathan B. P Das E. Sumbul R. Liu and L. Pileggi. 2014. Building Trusted ICs using Split Fabrication. HOST (2014) 1--6.","DOI":"10.1109\/HST.2014.6855559"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593123"},{"key":"#cr-split#-e_1_3_2_1_17_1.1","unstructured":"K. Vaidyanathan R. Liu E. Sumbul Q. Zhu F. Franchetti and L. Pileggi. 2014. Efficient and Secure Intellectual Property"},{"key":"#cr-split#-e_1_3_2_1_17_1.2","unstructured":"(IP) Design for Split Fabrication. HOST (2014) 13--18. K. Vaidyanathan R. Liu E. Sumbul Q. Zhu F. Franchetti and L. Pileggi. 2014. Efficient and Secure Intellectual Property"},{"key":"#cr-split#-e_1_3_2_1_17_1.3","unstructured":"(IP) Design for Split Fabrication. HOST (2014) 13--18."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2012.2227257"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898104"},{"key":"e_1_3_2_1_20_1","volume":"201","author":"Wang Y.","unstructured":"Y. Wang , P. Chen , J. Hu , and J. Rajendran. 201 7. Routing perturbation for enhanced security in split manufacturing. ASPDAC (2017), 605--510. Y. Wang, P. Chen, J. Hu, and J. Rajendran. 2017. Routing perturbation for enhanced security in split manufacturing. ASPDAC (2017), 605--510.","journal-title":"J. Rajendran."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.121"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/378239.378526"}],"event":{"name":"ASPDAC '19: 24th Asia and South Pacific Design Automation Conference","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEICE ESS Institute of Electronics, Information and Communication Engineers, Engineering Sciences Society","IEEE CAS","IEEE CEDA","IPSJ SIG-SLDM Information Processing Society of Japan, SIG System LSI Design Methodology"],"location":"Tokyo Japan","acronym":"ASPDAC '19"},"container-title":["Proceedings of the 24th Asia and South Pacific Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287624.3287698","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287624.3287698","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287624.3287698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:05Z","timestamp":1750208885000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287624.3287698"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,21]]},"references-count":24,"alternative-id":["10.1145\/3287624.3287698","10.1145\/3287624"],"URL":"https:\/\/doi.org\/10.1145\/3287624.3287698","relation":{},"subject":[],"published":{"date-parts":[[2019,1,21]]},"assertion":[{"value":"2019-01-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}