REFERENCES
Aksoy, L., Nguyen, Q., Almeida, F., Raik, J., Flottes, M.,
Dupuis, S., and Pagliarini, S. (2021). High-level In-
tellectual Property Obfuscation via Decoy Constants.
In IOLTS 2021, pages 1–7, Torino, Italy. IEEE.
Alcaraz, C., Miciolino, E. E., and Wolthusen, S.
(2013). Structural controllability of networks for non-
interactive adversarial vertex removal. In Critical
Information Infrastructures Security, pages 120–132.
Springer.
Alcaraz, C. and Wolthusen, S. (2014). Recovery of struc-
tural controllability for control systems. In Critical
Infrastructure Protection VIII, pages 47–63. Springer.
Azriel, L., Speith, J., Albartus, N., Ginosar, R., Mendel-
son, A., and Paar, C. (2021). A survey of algorithmic
methods in ic reverse engineering. Jour. of Crypto.
Eng., 11(3):299–315.
Bauer, T. and Hamlet, J. (2014). Physical unclonable func-
tions: A primer. IEEE Security Privacy, 12(6):97–
101.
Chakraborty, R. and Bhunia, S. (2009). Harpoon: an ob-
fuscation based soc design methodology for hardware
protection. IEEE Trans. CADIC Syst., 28(10):1493–
1502.
Chow, S., Eisen, P. A., Johnson, H., and van Oorschot, P. C.
(2003). White-box cryptography and an aes imple-
mentation. In SAC ’02, pages 250–270. Springer.
Cocchi, R., Baukus, J., Chow, L., and Wang, B. (2014).
Circuit camouflage integration for hardware ip protec-
tion. In DAC’14, pages 1–5.
Cong, J. and Minkovich, K. (2007). Improved sat-based
boolean matching using implicants for lut-based fp-
gas. In ISFPGA ’07, page 139–147.
Design and Reuse (2012). Innovation at risk: Ip infringe-
ment challenges the semiconductor equipment indus-
try.
Doom, T. E., White, J. L., Wojcik, A. S., and Chisholm, G.
(1998). Identifying high-level components in combi-
national circuits. In 8th GLS-VLSI, pages 313–318.
Fyrbiak, M., Strauß, S., Kison, C., Wallat, S., Elson, M.,
Rummel, N., and Paar, C. (2017). Hardware re-
verse engineering: Overview and open challenges. In
IVSW’19. IEEE Computer Society.
Gasc
´
on, A., Subramanyan, P., Dutertre, B., Tiwari, A., Jo-
vanovi
´
c, D., and Malik, S. (2014). Template-based
circuit understanding. In FMCAD’14, page 83–90.
Hansen, M., Yalcin, H., and Hayes, J. (1999). Unveil-
ing the iscas-85 benchmarks: a case study in reverse
engineering. Design & Test of Computers, IEEE,
16(3):72–80.
Li, M., Shamsi, K., Meade, T., Zhao, Z., Yu, B., Jin, Y.,
and Pan, D. Z. (2019). Provably secure camouflag-
ing strategy for ic protection. IEEE Trans. on Comp.-
Aided Des. of Integ. Circ. and Sys., 38(8):1399–1412.
Li, W., Gascon, A., Subramanyan, P., et al. (2013). Wor-
drev: Finding word-level structures in a sea of bit-
level gates. In HOST’13, pages 67–74.
Li, W., Wasson, Z., and Seshia, S. A. (2012). Reverse en-
gineering circuits using behavioral pattern mining. In
HOST’12, pages 83–88. IEEE Computer Society.
McDonald, J., Kim, Y., and Grimaila, M. (2009). Protect-
ing reprogrammable hardware with polymorphic cir-
cuit variation. In CSRW ’09.
McDonald, J., Kim, Y., and Koranek, D. (2011). Determin-
istic circuit variation for anti-tamper applications. In
CSIIRW ’11.
McDonald, J., Kim, Y., Koranek, D., and Parham, J. (2012).
Evaluating component hiding techniques in circuit
topologies. In ICC’12, pages 1138–1143.
McDonald, J., Stroud, T., and Andel, T. (2020). Polymor-
phic circuit generation using random boolean logic ex-
pansion. In SAC’20.
Meade, T., Zhang, S., and Jin, Y. (2016). Netlist reverse en-
gineering for high-level functionality reconstruction.
In ASP-DAC’16, pages 655–660.
Nohl, K., Evans, D., Starbug, S., and Pl
¨
otz, H. (2008).
Reverse-engineering a cryptographic rfid tag. In
USENIX’08, page 185–193, USA. USENIX Associ-
ation.
Quadir, S. E., Chen, J., Forte, D., et al. (2016). A survey on
chip to system reverse engineering. J. Emerg. Technol.
Comput. Syst., 13(1).
Shamsi, K., Li, M., Meade, T., et al. (2017a). Circuit obfus-
cation and oracle-guided attacks: Who can prevail? In
Proc. of GLS-VLSI 2017, page 357–362.
Shamsi, K., Li, M., Meade, T., Zhao, Z., Pan, D. Z., and Jin,
Y. (2017b). Appsat: Approximately deobfuscating in-
tegrated circuits. In HOST’17, pages 95–100.
Shamsi, K., Li, M., Plaks, K., et al. (2019). Ip protec-
tion and supply chain security through logic obfusca-
tion: A systematic overview. ACM Trans. Des. Autom.
Electron. Syst., 24(6).
Shi, Y., Ting, C., Gwee, B., and Ren, Y. (2010). A highly ef-
ficient method for extracting fsms from flattened gate-
level netlist. In ISCAS’10, pages 2610–2613.
Subramanyan, P., Tsiskaridze, N., Pasricha, K., Reisman,
D., Susnea, A., and Malik, S. (2013). Reverse engi-
neering digital circuits using functional analysis. In
DATE ’13, page 1277–1280.
Torrance, R. and James, D. (2011). The state-of-the-art in
semiconductor reverse engineering. In DAC’11, pages
333–338.
Vijayakumar, A., Patil, V. C., Holcomb, D. E., Paar, C.,
and Kundu, S. (2017). Physical design obfuscation
of hardware: A comprehensive investigation of device
and logic-level techniques. IEEE Trans. on Info. For.
and Sec., 12(1):64–77.
Wendt, J. B. and Potkonjak, M. (2014). Hardware obfus-
cation using puf-based logic. In ICCAD’14, ICCAD
’14, page 270–277. IEEE Press.
White, J. L., Wojcik, A. S., Chung, M., and Doom, T. E.
(2000). Candidate subcircuits for functional module
identification in logic circuits. In Proc. of 10th GLS-
VLSI, page 34–38.
Yasin, M., Mazumdar, B., Sinanoglu, O., and Rajendran, J.
(2020). Removal attacks on logic locking and cam-
ouflaging techniques. IEEE Trans. Emerg. Topics
Comp., 8(2):517–532.
Zhang, J. (2016). A practical logic obfuscation technique
for hardware security. IEEE Trans. Very Large Scale
Integr. Syst., 24(3):1193–1197.
SECRYPT 2022 - 19th International Conference on Security and Cryptography
192