{"id":"https://openalex.org/W4391182427","doi":"https://doi.org/10.1109/asianhost59942.2023.10409305","title":"HeisenTrojans: They Are Not There Until They Are Triggered","display_name":"HeisenTrojans: They Are Not There Until They Are Triggered","publication_year":2023,"publication_date":"2023-12-13","ids":{"openalex":"https://openalex.org/W4391182427","doi":"https://doi.org/10.1109/asianhost59942.2023.10409305"},"language":"en","primary_location":{"id":"doi:10.1109/asianhost59942.2023.10409305","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/asianhost59942.2023.10409305","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093557916","display_name":"Akshita Reddy Mavurapu","orcid":null},"institutions":[{"id":"https://openalex.org/I179093154","display_name":"University of New Hampshire at Manchester","ror":"https://ror.org/04pvpk743","country_code":"US","type":"education","lineage":["https://openalex.org/I179093154"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Akshita Reddy Mavurapu","raw_affiliation_strings":["University of New Hampshire"],"affiliations":[{"raw_affiliation_string":"University of New Hampshire","institution_ids":["https://openalex.org/I179093154"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076364292","display_name":"Haoqi Shan","orcid":"https://orcid.org/0000-0003-1440-1828"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Haoqi Shan","raw_affiliation_strings":["CertiK"],"affiliations":[{"raw_affiliation_string":"CertiK","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101974086","display_name":"Xiaolong Guo","orcid":"https://orcid.org/0000-0002-4535-6137"},"institutions":[{"id":"https://openalex.org/I146416000","display_name":"University of Kansas","ror":"https://ror.org/001tmjg57","country_code":"US","type":"education","lineage":["https://openalex.org/I146416000"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaolong Guo","raw_affiliation_strings":["University of Kansas"],"affiliations":[{"raw_affiliation_string":"University of Kansas","institution_ids":["https://openalex.org/I146416000"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014413722","display_name":"Orlando Arias","orcid":"https://orcid.org/0009-0002-3948-5773"},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Orlando Arias","raw_affiliation_strings":["University of Massachusetts, Lowell"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts, Lowell","institution_ids":["https://openalex.org/I133738476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069563170","display_name":"Dean Sullivan","orcid":"https://orcid.org/0000-0002-7186-4346"},"institutions":[{"id":"https://openalex.org/I179093154","display_name":"University of New Hampshire at Manchester","ror":"https://ror.org/04pvpk743","country_code":"US","type":"education","lineage":["https://openalex.org/I179093154"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dean Sullivan","raw_affiliation_strings":["University of New Hampshire"],"affiliations":[{"raw_affiliation_string":"University of New Hampshire","institution_ids":["https://openalex.org/I179093154"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5093557916"],"corresponding_institution_ids":["https://openalex.org/I179093154"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19461217,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2002","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.8644189834594727},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8188576698303223},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7052615880966187},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5851108431816101},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.5584462285041809},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5550353527069092},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4335687458515167},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.4308392107486725},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42253023386001587},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41344988346099854},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4110344648361206},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2865820527076721},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12677419185638428}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.8644189834594727},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8188576698303223},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7052615880966187},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5851108431816101},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.5584462285041809},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5550353527069092},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4335687458515167},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.4308392107486725},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42253023386001587},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41344988346099854},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4110344648361206},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2865820527076721},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12677419185638428},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asianhost59942.2023.10409305","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/asianhost59942.2023.10409305","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1480909796","https://openalex.org/W1528837436","https://openalex.org/W1864032062","https://openalex.org/W2089448621","https://openalex.org/W2117798902","https://openalex.org/W2162800072","https://openalex.org/W2600258283","https://openalex.org/W2802352283","https://openalex.org/W2806746626","https://openalex.org/W3008410827","https://openalex.org/W3028955404","https://openalex.org/W3082737479","https://openalex.org/W3162222355","https://openalex.org/W3172669705","https://openalex.org/W3194771370","https://openalex.org/W4221164739","https://openalex.org/W4288057760","https://openalex.org/W4289038676","https://openalex.org/W4315464924","https://openalex.org/W4321383456","https://openalex.org/W6604073510","https://openalex.org/W6605051096","https://openalex.org/W6638769890","https://openalex.org/W6782130387","https://openalex.org/W6784534981","https://openalex.org/W6790848453","https://openalex.org/W6800603138"],"related_works":["https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W3203597304","https://openalex.org/W4385301282","https://openalex.org/W2990186179","https://openalex.org/W4248424560","https://openalex.org/W2352737138","https://openalex.org/W1966145327","https://openalex.org/W1482973429","https://openalex.org/W3130460901"],"abstract_inverted_index":{"The":[0,119],"hardware":[1,58,113],"security":[2],"community":[3],"has":[4],"made":[5],"significant":[6],"advances":[7],"in":[8,35,71,188],"detecting":[9],"Hardware":[10],"Trojan":[11],"vulnerabilities":[12,70],"using":[13],"software":[14,46,69],"fuzzing-inspired":[15],"automated":[16],"analysis.":[17],"However,":[18],"the":[19,30,72,93,96,131,135,160,179,195],"Electronic":[20],"Design":[21],"Automation":[22],"(EDA)":[23],"code":[24,129],"base":[25],"itself":[26],"remains":[27],"under-examined":[28],"by":[29],"same":[31],"techniques.":[32],"Our":[33,155],"experiments":[34],"fuzzing":[36],"EDA":[37,73,97,137,161,199],"tools":[38,74,98,102,162,200],"demonstrate":[39,171],"that,":[40],"indeed,":[41],"they":[42,84],"are":[43,85],"prone":[44],"to":[45,126,184,190,197],"bugs.":[47,166],"As":[48],"a":[49,56,89,122,143,148],"consequence,":[50],"this":[51],"paper":[52],"unveils":[53],"HeisenTrojan":[54,80,104,123,186],"attacks,":[55],"new":[57],"attack":[59,124,174],"that":[60,83,114,153],"does":[61],"not":[62,107],"generate":[63],"harmful":[64],"hardware,":[65],"but":[66],"rather,":[67],"exploits":[68],"themselves.":[75],"A":[76],"key":[77],"feature":[78],"of":[79,87,121,159,182],"attacks":[81,105,187],"is":[82,125,139],"capable":[86],"deploying":[88],"malicious":[90,112],"payload":[91],"on":[92,109,130,133,178],"system":[94,132],"hosting":[95],"without":[99],"triggering":[100],"verification":[101],"because":[103],"do":[106],"rely":[108],"superfluous":[110],"or":[111],"would":[115],"otherwise":[116],"be":[117],"noticeable.":[118],"aim":[120],"execute":[127],"arbitrary":[128],"which":[134],"vulnerable":[136],"tool":[138],"hosted,":[140],"thereby":[141],"establishing":[142],"permanent":[144],"presence":[145],"and":[146,175,194],"providing":[147],"beachhead":[149],"for":[150],"intrusion":[151],"into":[152],"system.":[154],"analysis":[156,177],"reveals":[157],"83%":[158],"analyzed":[163],"have":[164],"exploitable":[165],"In":[167],"what":[168],"follows,":[169],"we":[170],"an":[172],"end-to-end":[173],"provide":[176],"existing":[180],"capabilities":[181],"fuzzers":[183],"find":[185],"order":[189],"emphasize":[191],"their":[192],"practicality":[193],"need":[196],"secure":[198],"against":[201],"them.":[202]},"counts_by_year":[],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
