{"id":"https://openalex.org/W2296447978","doi":"https://doi.org/10.1109/aspdac.2016.7427988","title":"Improving tag generation for memory data authentication in embedded processor systems","display_name":"Improving tag generation for memory data authentication in embedded processor systems","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2296447978","doi":"https://doi.org/10.1109/aspdac.2016.7427988","mag":"2296447978"},"language":"en","primary_location":{"id":"doi:10.1109/aspdac.2016.7427988","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aspdac.2016.7427988","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100338083","display_name":"Tao Liu","orcid":"https://orcid.org/0000-0001-9220-151X"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Tao Liu","raw_affiliation_strings":["School of Computer Science and Engineering, University of New South Wales, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of New South Wales, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115076813","display_name":"Hui Guo","orcid":"https://orcid.org/0009-0009-4952-4271"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hui Guo","raw_affiliation_strings":["School of Computer Science and Engineering, University of New South Wales, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of New South Wales, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030042327","display_name":"Sri Parameswaran","orcid":"https://orcid.org/0000-0003-0435-9080"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sri Parameswaran","raw_affiliation_strings":["School of Computer Science and Engineering, University of New South Wales, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of New South Wales, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100600905","display_name":"Xiaobo Sharon Hu","orcid":"https://orcid.org/0000-0002-6636-9738"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"X. Sharon Hu","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, IN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, IN, USA","institution_ids":["https://openalex.org/I107639228"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100338083"],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":1.7139,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.88475954,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"13","issue":null,"first_page":"50","last_page":"55"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8174571990966797},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.7031853199005127},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5972597002983093},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.577886700630188},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5487837791442871},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4921552538871765},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.45198383927345276},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.41036534309387207},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3850991129875183},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16092607378959656}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8174571990966797},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.7031853199005127},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5972597002983093},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.577886700630188},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5487837791442871},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4921552538871765},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.45198383927345276},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.41036534309387207},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3850991129875183},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16092607378959656},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aspdac.2016.7427988","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aspdac.2016.7427988","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W25360022","https://openalex.org/W1504211573","https://openalex.org/W1537185870","https://openalex.org/W1569612250","https://openalex.org/W1586481148","https://openalex.org/W1597235115","https://openalex.org/W1665303156","https://openalex.org/W1977467261","https://openalex.org/W2022521688","https://openalex.org/W2060689780","https://openalex.org/W2105355884","https://openalex.org/W2132251150","https://openalex.org/W2146009225","https://openalex.org/W2151396176","https://openalex.org/W2155115217","https://openalex.org/W2167569963","https://openalex.org/W3144914764"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W4242235492","https://openalex.org/W4237162029","https://openalex.org/W2367268135","https://openalex.org/W2385701518","https://openalex.org/W4237464767","https://openalex.org/W2519603953","https://openalex.org/W4362497183","https://openalex.org/W563434055","https://openalex.org/W2075298824"],"abstract_inverted_index":{"Data":[0],"integrity":[1,9,120],"is":[2,10,33,112,146,152],"important.":[3],"One":[4],"way":[5],"to":[6,15,82,88,130,173,209],"protect":[7],"data":[8,22,32,59,65,119,134,151,189],"attaching":[11],"an":[12,52],"identifying":[13],"tag":[14,40,54,103,167,215],"individual":[16],"data.":[17],"The":[18],"authenticity":[19],"of":[20,96,108,177,214,225],"the":[21,31,36,38,44,70,75,94,99,106,110,118,126,132,136,144,149,165,185,188,211,223,226],"can":[23,77,116],"then":[24],"be":[25,47,78,83],"checked":[26],"against":[27],"its":[28],"tag.":[29],"If":[30],"altered":[34],"by":[35],"adversary,":[37],"related":[39],"becomes":[41],"invalid":[42],"and":[43,80,102,115,203],"attack":[45,121,137],"will":[46],"detected.":[48],"This":[49],"paper":[50],"studies":[51],"existing":[53],"design":[55,92,111,145],"(CETD)":[56],"for":[57,217],"memory":[58,71],"in":[60,69,135],"embedded":[61],"processor":[62],"systems,":[63],"where":[64],"that":[66,143],"are":[67,138,161],"stored":[68],"or":[72],"transferred":[73],"over":[74,164],"bus":[76],"tampered":[79],"need":[81],"authenticated":[84],"before":[85],"use.":[86],"Compared":[87],"other":[89],"designs,":[90],"this":[91,196,201],"offers":[93],"flexibility":[95],"tradeoff":[97],"between":[98],"implementation":[100],"cost":[101,113,207],"size":[104],"(hence":[105],"level":[107],"security);":[109],"effective":[114],"counter":[117],"with":[122],"random":[123],"values;":[124],"namely":[125],"fake":[127,150,186],"values":[128,181,216],"used":[129],"replace":[131],"valid":[133],"random.":[139],"However,":[140],"we":[141,198],"find":[142],"vulnerable":[147],"when":[148],"not":[153,162],"randomly":[154],"selected.":[155],"For":[156],"some":[157],"data,":[158,219],"their":[159],"tags":[160],"distributed":[163],"full":[166],"value":[168],"space":[169],"but":[170],"rather":[171],"limited":[172],"a":[174,205],"reduced":[175],"set":[176],"values.":[178],"When":[179],"those":[180],"were":[182],"chosen":[183],"as":[184],"value,":[187],"alteration":[190],"would":[191],"likely":[192],"go":[193],"undetected.":[194],"In":[195],"paper,":[197],"analytically":[199],"investigate":[200],"problem":[202],"propose":[204],"low":[206],"enhancement":[208],"ensure":[210],"full-range":[212],"distribution":[213],"each":[218],"hence":[220],"effectively":[221],"removing":[222],"vulnerability":[224],"original":[227],"design.":[228]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
