{"id":3660,"date":"2022-12-17T21:26:19","date_gmt":"2022-12-17T21:26:19","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3660"},"modified":"2022-12-18T18:05:44","modified_gmt":"2022-12-18T18:05:44","slug":"neos","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/ip-protection\/neos\/","title":{"rendered":"NEOS"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Tool Name<\/h2>\n\n\n\n<p>NEOS: Netlist Encryption and Obfuscation Suite<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Description<\/strong><\/h2>\n\n\n\n<p>NEOS is an object-oriented framework written in modern C++ for gate-level netlist obfuscation\/deobfuscation. The tool contains a set of obfuscation and deobfuscation utilities and can be used through the command line.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>More Info<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"https:\/\/bitbucket.org\/kavehshm\/neos\/src\/master\/\" target=\"_blank\" rel=\"noreferrer noopener\">tool link<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Publications\/References<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7335\">\u00a0<\/a>K. Shamsi, M. Li, D. Z. Pan and Y. Jin, &#8220;KC2: Key-Condition Crunching for Fast Sequential Circuit Deobfuscation,&#8221;\u00a0<em>2019 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)<\/em>, 2019, pp. 534-539, doi: 10.23919\/DATE.2019.8715053. <a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8715053\" target=\"_blank\">https:\/\/ieeexplore.ieee.org\/abstract\/document\/8715053<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contacts<\/strong><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Tool Name NEOS: Netlist Encryption and Obfuscation Suite Description NEOS is an object-oriented framework written in modern C++ for gate-level netlist obfuscation\/deobfuscation. The tool contains a set of obfuscation and deobfuscation utilities and can be used through the command line. More Info Publications\/References \u00a0K. Shamsi, M. Li, D. Z. Pan and Y. Jin, &#8220;KC2: Key-Condition &hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":2347,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3660"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3660"}],"version-history":[{"count":4,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3660\/revisions"}],"predecessor-version":[{"id":3742,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3660\/revisions\/3742"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2347"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}