{"id":3651,"date":"2022-12-17T21:21:31","date_gmt":"2022-12-17T21:21:31","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3651"},"modified":"2022-12-18T17:49:33","modified_gmt":"2022-12-18T17:49:33","slug":"obfusx-routing-obfuscation-with-explanatory-analysis-of-a-machine-learning-attack","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/ip-protection\/obfusx-routing-obfuscation-with-explanatory-analysis-of-a-machine-learning-attack\/","title":{"rendered":"ObfusX Routing Obfuscation with Explanatory Analysis of a Machine Learning Attack"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Tool Name<\/h2>\n\n\n\n<p>ObfusX Routing Obfuscation with Explanatory Analysis of a Machine Learning Attack<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Description<\/strong><\/h2>\n\n\n\n<p>This is the first work that incorporates recent advancements in &#8220;explainability&#8221; of machine learning (ML) to build a routing obfuscator called ObfusX. We adopt a recent metric\u2014the SHAP value\u2014 which explains to what extent each layout feature can reveal each unknown connection for a recent ML-based split manufacturing attack model.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>More Info<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"https:\/\/github.com\/wei-zeng\/obfusx\" target=\"_blank\" rel=\"noreferrer noopener\">Tool link<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Publications\/References<\/strong><\/h2>\n\n\n\n<p>W. Zeng, A. Davoodi and R. O. Topaloglu, &#8220;ObfusX: Routing Obfuscation with Explanatory Analysis of a Machine Learning Attack,&#8221;\u00a0<em>2021 26th Asia and South Pacific Design Automation Conference (ASP-DAC)<\/em>, 2021, pp. 548-554. <a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/document\/9371556\" target=\"_blank\">https:\/\/ieeexplore.ieee.org\/document\/9371556<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contacts<\/strong><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Tool Name ObfusX Routing Obfuscation with Explanatory Analysis of a Machine Learning Attack Description This is the first work that incorporates recent advancements in &#8220;explainability&#8221; of machine learning (ML) to build a routing obfuscator called ObfusX. We adopt a recent metric\u2014the SHAP value\u2014 which explains to what extent each layout feature can reveal each unknown &hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":2347,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3651"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3651"}],"version-history":[{"count":3,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3651\/revisions"}],"predecessor-version":[{"id":3732,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3651\/revisions\/3732"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2347"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}