{"id":"https://openalex.org/W3133898618","doi":"https://doi.org/10.1109/asianhost51057.2020.9358257","title":"A Formal Framework for Gate- Level Information Leakage Using Z3","display_name":"A Formal Framework for Gate- Level Information Leakage Using Z3","publication_year":2020,"publication_date":"2020-12-15","ids":{"openalex":"https://openalex.org/W3133898618","doi":"https://doi.org/10.1109/asianhost51057.2020.9358257","mag":"3133898618"},"language":"en","primary_location":{"id":"doi:10.1109/asianhost51057.2020.9358257","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asianhost51057.2020.9358257","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102731015","display_name":"Qizhi Zhang","orcid":"https://orcid.org/0000-0002-5131-2202"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qizhi Zhang","raw_affiliation_strings":["Tianjin University"],"affiliations":[{"raw_affiliation_string":"Tianjin University","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012948983","display_name":"Jiaji He","orcid":"https://orcid.org/0000-0003-1443-9279"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaji He","raw_affiliation_strings":["Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100952126","display_name":"Yiqiang Zhao","orcid":"https://orcid.org/0000-0002-4564-952X"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiqiang Zhao","raw_affiliation_strings":["Tianjin University"],"affiliations":[{"raw_affiliation_string":"Tianjin University","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011794280","display_name":"Xiaolong Guo","orcid":"https://orcid.org/0000-0001-9896-9407"},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaolong Guo","raw_affiliation_strings":["Kansas State University"],"affiliations":[{"raw_affiliation_string":"Kansas State University","institution_ids":["https://openalex.org/I189590672"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102731015"],"corresponding_institution_ids":["https://openalex.org/I162868743"],"apc_list":null,"apc_paid":null,"fwci":0.3977,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.70561742,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7951056957244873},{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.7759052515029907},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.7064432501792908},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.579767107963562},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5352671146392822},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.5135917663574219},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.48746800422668457},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.4515293836593628},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.44065025448799133},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4264727532863617},{"id":"https://openalex.org/keywords/satisfiability-modulo-theories","display_name":"Satisfiability modulo theories","score":0.4260401129722595},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.4100794494152069},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3486975431442261},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28330034017562866},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.17402228713035583},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14634573459625244},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.11782068014144897}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7951056957244873},{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.7759052515029907},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.7064432501792908},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.579767107963562},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5352671146392822},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.5135917663574219},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.48746800422668457},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.4515293836593628},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.44065025448799133},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4264727532863617},{"id":"https://openalex.org/C164155591","wikidata":"https://www.wikidata.org/wiki/Q2067766","display_name":"Satisfiability modulo theories","level":2,"score":0.4260401129722595},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.4100794494152069},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3486975431442261},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28330034017562866},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.17402228713035583},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14634573459625244},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.11782068014144897},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asianhost51057.2020.9358257","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asianhost51057.2020.9358257","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1480909796","https://openalex.org/W1596552075","https://openalex.org/W1992787530","https://openalex.org/W2021949528","https://openalex.org/W2050351395","https://openalex.org/W2056448011","https://openalex.org/W2068118521","https://openalex.org/W2112173236","https://openalex.org/W2116469687","https://openalex.org/W2117362901","https://openalex.org/W2117550587","https://openalex.org/W2123205813","https://openalex.org/W2123596153","https://openalex.org/W2131129639","https://openalex.org/W2136296832","https://openalex.org/W2145936802","https://openalex.org/W2145937629","https://openalex.org/W2150619336","https://openalex.org/W2150928734","https://openalex.org/W2167849054","https://openalex.org/W2512350220","https://openalex.org/W2604769341","https://openalex.org/W2762373765","https://openalex.org/W2946251796","https://openalex.org/W2952795984","https://openalex.org/W4236770701","https://openalex.org/W4237763351","https://openalex.org/W4242736856","https://openalex.org/W4247198503","https://openalex.org/W6682184091","https://openalex.org/W6735675979"],"related_works":["https://openalex.org/W2284547673","https://openalex.org/W3202607186","https://openalex.org/W4312396578","https://openalex.org/W4380352299","https://openalex.org/W3161112328","https://openalex.org/W2028522822","https://openalex.org/W4288075818","https://openalex.org/W189451467","https://openalex.org/W2077568170","https://openalex.org/W3200138464"],"abstract_inverted_index":{"Ahstract-":[0],"The":[1,144],"hardware":[2,66,117],"intellectual":[3],"property":[4],"(IP)":[5],"cores":[6],"from":[7,41,148],"untrusted":[8],"vendors":[9],"are":[10,61],"widely":[11],"used,":[12],"which":[13],"has":[14],"raised":[15],"security":[16],"concerns":[17],"for":[18,27,158],"system":[19],"designers.":[20],"Although":[21],"formal":[22,120],"methods":[23,40],"provide":[24],"powerful":[25,50],"solutions":[26,60],"detecting":[28],"malicious":[29],"behaviors":[30],"in":[31,65,87,100],"hardware,":[32],"the":[33,39,88,102,105,109,115,119,127,132,134,162,168,171],"participation":[34],"of":[35,91,104,170],"manual":[36,128],"work":[37],"prevents":[38],"practical":[42,69],"applications.":[43],"Information":[44],"Flow":[45],"Tracking":[46],"(IFT)":[47],"is":[48,122,137],"a":[49,79,112],"approach":[51],"to":[52,118,124,166],"prevent":[53],"sensitive":[54],"information":[55,84,147],"leakage.":[56],"However,":[57],"existing":[58],"IFT":[59],"either":[62],"introducing":[63],"overhead":[64],"or":[67],"lacking":[68],"automatic":[70],"working":[71,164],"procedures.":[72],"To":[73,130],"alleviate":[74],"these":[75],"challenges,":[76],"we":[77],"propose":[78],"framework":[80,94],"that":[81],"fully":[82],"automates":[83],"leakage":[85],"detection":[86],"gate":[89],"level":[90],"hardware.":[92],"This":[93],"introduces":[95],"Z3,":[96],"an":[97],"SMT":[98],"solver,":[99],"checking":[101],"violation":[103],"confidentiality":[106],"automatically.":[107],"On":[108],"other":[110],"hand,":[111],"parser":[113],"converting":[114],"gate-level":[116,141],"model":[121],"developed":[123],"further":[125],"remove":[126],"workload.":[129],"validate":[131],"effectiveness,":[133],"proposed":[135,172],"solution":[136],"tested":[138],"on":[139],"11":[140],"netlist":[142],"benchmarks.":[143],"Trojans":[145],"leaking":[146],"circuit":[149],"outputs":[150],"can":[151],"be":[152],"automatically":[153],"detected.":[154],"We":[155],"also":[156],"account":[157],"time":[159],"consumption":[160],"during":[161],"whole":[163],"procedure":[165],"show":[167],"efficiency":[169],"approach.":[173]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
