{"created":"2025-01-19T01:10:35.077144+00:00","updated":"2025-01-19T18:34:25.131461+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00209262","sets":["1164:1579:10482:10483"]},"path":["10483"],"owner":"44499","recid":"209262","title":["論理施錠の施錠強度と攻撃耐性についての新たな評価の手法"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-01-18"},"_buckets":{"deposit":"eff70194-e649-47b0-9e5d-91d1baed0963"},"_deposit":{"id":"209262","pid":{"type":"depid","value":"209262","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"論理施錠の施錠強度と攻撃耐性についての新たな評価の手法","author_link":["527045","527048","527047","527046"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"論理施錠の施錠強度と攻撃耐性についての新たな評価の手法"},{"subitem_title":"A new method for evaluating corruption and resilience metrics of logic locking","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2021-01-18","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"九州大学大学院システム情報科学府・研究院"},{"subitem_text_value":"九州大学大学院システム情報科学府・研究院"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School and Faculty of Information Science and Electrical Engineering, Kyushu University","subitem_text_language":"en"},{"subitem_text_value":" Graduate School and Faculty of Information Science and Electrical Engineering, Kyushu University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/209262/files/IPSJ-ARC21243026.pdf","label":"IPSJ-ARC21243026.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-ARC21243026.pdf","filesize":[{"value":"1.6 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"16"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"ad52bd95-a32c-41fc-95be-f69e799e2f15","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"南, 周作"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"松永, 裕介"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Shusaku, Minami","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yusuke, Matsunaga","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10096105","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8574","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"集積回路の知的財産権を保護するために,論理施錠という技術が存在する.しかし,既存の論理施錠手法に対しては SAT 攻撃や AppSAT 攻撃などといった様々な攻撃手法が提案されている.本稿では,それらの攻撃手法を解析した結果から得られた,論理施錠の強度と攻撃にする耐性についての新たな指標を提示する.また,それらの指標に基づいて論理施錠手法を評価する手法を提案する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In order to protect integrated circuits from acts that infringe on the intellectual property of them, there is a technique called logic locking. However, various attack methods such as SAT attack and AppSAT attack have been proposed for the existing logic locking.In this paper, we present new indicators of metrics and resilience of logic locking, which were obtained from the results of analyzing these attack methods. We also propose a method for evaluating logic locking based on these indicators.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告システム・アーキテクチャ(ARC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2021-01-18","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"26","bibliographicVolumeNumber":"2021-ARC-243"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":209262,"links":{}}